Computer Virus Rapid Research (One-Pager)



Cybersecurity and Crime One-Pager Template
<change this to your title>
logo-teal.png

Note: All text in Italics, including this text, is intended to be replaced by your responses, and deleted once you’ve completed your one-pager.

Overview

When did the event happen?
Whose data was lost / stolen / leaked? How many people / organizations were affected?
Provide any other context necessary to understand the “big picture” of the event.
The CryptoLocker ransomware attack was a cyberattack using the CryptoLocker ransomware that occurred on the internet from 5 September 2013 to late May 2014. The attack utilized a trojan that affected computers running Microsoft Windows. It propagated via infected email attachments, when activated, the malware encrypts certain types of files stored on local and mounted network drives using RSA public-key cryptography and then takes that private key back to their servers. [1] By then, your data is unable to decrypted without the malware’s private key which is most likely in their servers. all The malware then displays a message which offers to decrypt the data if a payment (either asking for bitcoin or a pre-paid cash voucher) is made by a stated deadline, and it will threaten to delete the private key if the deadline passes. If the deadline is wasn’t fulfilled, the malware offered to decrypt data via an online service provided by the malware's operators, for a significantly higher price in bitcoin. However, there is no guarantee that payment will release the encrypted content. The malware was eventually controlled and isolated by Operation Tovar which halted its distribution of the malware.

How and How to Prevent

What specific type of attack / mistake led to the data falling into the wrong hands? Reference terms in “How Not to Get Hacked” where applicable. What types of cybersecurity techniques might be used to help prevent this from happening again?
The biggest mistake in people having their data fall in the wrong hands is when they download files off the internet without any prior knowledge or proper caution. The main technique to help prevent this is that you should always know what you click on. Be observant at unknown emails sending you things or strangers asking for personal information.  Without proper observation, you could be downloading a virus that would record your personal information. Malware can hide in common examples such as pictures and emails.

Data Specifics

What specific data was stolen? Try to avoid vague terms like “financial data” and instead find the specific pieces of information like “credit card numbers”. Specific answers here will strengthen your explanation in the next section.
There was no specific data that was stolen since the hackers only wanted money to release the files back to the victim. However, CryptoLocker malware would target files that had extensions to other sources of data such as hard drives, servers, etc. [2]

Data Privacy / Security / Storage Concern

What specific concerns arise from this data being used in unintended ways or by unintended people? Is there already evidence of the data being used in these ways? Cite sources if you can find specific news stories.
If CryptoLocker malware targeted data tied to other networks, issues could arise such as an entire corporation being hacked by CryptoLocker if only one computer got compromised at the start. Another example would be having all my hard drives backed up with important data being encrypted because my computer was connected to them when I was hacked. It makes CryptoLocker easy to sneak through as it can come through anyway and spread if there is any more sources of data connected. One news story is when Dell SecureWorks last September was compromised by this malware. It encrypted multiple files that had specific file extensions, and only decrypted them once a ransom of $300 had been paid. [3]

Sources

List all websites that you used to find any information you wrote here.  Include the permanent URL. Identify the author, title, source, the date you retrieved the source, and, if possible, the date the reference was written or posted. You should number your sources, here is a template you can follow:

[1] Cybersecurity: Strategies and Techniques, www.ipcopper.com/cybersecurity.htm. 1/16/18
[2] Jarvis, Keith. “CryptoLocker Ransomware Threat Analysis.” Secureworks, www.secureworks.com/research/cryptolocker-ransomware. 1/16/18
[3] Cawley, Christian, et al. “CryptoLocker Is Dead: Here's How You Can Get Your Files Back!” MakeUseOf, 14 Aug. 2014, www.makeuseof.com/tag/cryptolocker-dead-heres-can-get-files-back/. 1/16/18



Conduct Your Research
You already have some practice finding good resources online. You’ll want to find recently published documents from authoritative sources. There is no need to use overly technical documents, but keep an eye out for familiar terminology and topics.

Key Information to Find
  • Overview: Whose data was stolen? When did this happen? Briefly explain the context of the event.
  • Data Specifics: What specific data fell into the wrong hands?
  • How was it stolen / How to Prevent: How specifically was the data stolen? Is this a flaw in the technology? Were there any cybersecurity measures in place? How might this type of attack be prevented in the future?  
  • Data Privacy / Security Concerns: What specific concerns arise from this data being stolen? Is there already evidence of the data being used in concerning ways? Try to find how the privacy or security of some people were compromised.

Use the tables below to keep track of your information; you can also add more if you like. You’ll need to include at least 3 sources of information but you can use more.

My Cybercrime Event: Computer Viruses (CryptoLocker leak of 2014)
Reference Name: Cybersecurity: Strategies and Techniques

Year Published: 2013
Key Information
  • Cyber attacks unfold through sequences of bits and bytes that command computers to, for example, transmit, modify or delete data.
  • One bit or byte looks very much like another and the number of possible combinations of code infinite, which makes identifying and stopping the bad network traffic difficult.


Reference Name: CryptoLocker Is Dead: Here’s How You Can Get Your Files Back!

Year Published: August 14th, 2014
Key Information
  • The CryptoLocker trojan was first discovered by Dell SecureWorks last September. It works by encrypting files that have specific file extensions, and only decrypting them once a ransom of $300 had been paid.
  • It didn’t just attack local hard drives, either. If there was an external hard drive or a mapped network drive connected to an infected computer, it too would be attacked.

Reference Name:
CryptoLocker Ransomware


Year Published: December 13rd, 2013
Key Information
  • Victims of these traditional forms of ransomware could ignore the demands and use security software to unlock the system and remove the offending malware.
  • CryptoLocker changes this dynamic by aggressively encrypting files on the victim's system and returning control of the files to the victim only after the ransom is paid.

Comments

Post a Comment

Popular posts from this blog

Reflections from Blown to Bits Ch. 3 (Homework- 9/28/17)

Unit 3 Lesson 5- Creating Functions (Diamond Code)

Blown to Bits Appendix/Ch.3 Reflection (Homework- 10/11/17)