2022
DOI: 10.3390/su141912288
|View full text |Cite
|
Sign up to set email alerts
|

Alternate Data Stream Attack Framework to Perform Stealth Attacks on Active Directory Hosts

Abstract: Microsoft’s file system, NTFS, is the most utilised file system by Windows OS versions XP, Vista, 7, and 10. These systems have a little-known file attribute feature known as alternate data streams (ADS) which allows each file in the NTFS file system to have multiple data streams. ADS cannot be removed from the NTFS operating systems. However, the presence of ADS is not inevitably an issue in the OS or file system. Valid instances can be found on systems if scanned and might be valid. Windows OS does not have … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…The ethical and practical considerations surrounding ransom payment are examined, including the potential risks and implications of negotiating with attackers [9]. Backup and contingency planning are highlighted as essential components of a comprehensive ransomware mitigation strategy [39]. The role of emergency response teams and thirdparty cybersecurity firms in managing the aftermath of an attack is also explored, providing insights into the collaborative efforts required to mitigate the impact of ransomware [15].…”
Section: Response and Mitigation Strategiesmentioning
confidence: 99%
See 1 more Smart Citation
“…The ethical and practical considerations surrounding ransom payment are examined, including the potential risks and implications of negotiating with attackers [9]. Backup and contingency planning are highlighted as essential components of a comprehensive ransomware mitigation strategy [39]. The role of emergency response teams and thirdparty cybersecurity firms in managing the aftermath of an attack is also explored, providing insights into the collaborative efforts required to mitigate the impact of ransomware [15].…”
Section: Response and Mitigation Strategiesmentioning
confidence: 99%
“…In particular, RansomCillin's proficiency in rapidly reverting files to their pre-attack state offers significant advantages [15], [16]. The software effectively minimizes downtime, a crucial factor for businesses where prolonged inaccessibility to data can lead to substantial operational disruptions and financial setbacks [39], [8]. The ability of RansomCillin to operate with a marginal impact on overall system performance ensures that users can continue their routine activities without experiencing significant slowdowns or disruptions, an essential aspect for maintaining productivity in a high-paced digital workspace.…”
Section: B Strategic Advancements In Ransomware Mitigationmentioning
confidence: 99%
“…The ethical and practical considerations surrounding ransom payment are examined, including the potential risks and implications of negotiating with attackers [9]. Backup and contingency planning are highlighted as essential components of a comprehensive ransomware mitigation strategy [38]. The role of emergency response teams and thirdparty cybersecurity firms in managing the aftermath of an attack is also explored, providing insights into the collaborative efforts required to mitigate the impact of ransomware [15].…”
Section: Response and Mitigation Strategiesmentioning
confidence: 99%
“…In particular, RansomCillin's proficiency in rapidly reverting files to their pre-attack state offers significant advantages [15], [16]. The software effectively minimizes downtime, a crucial factor for businesses where prolonged inaccessibility to data can lead to substantial operational disruptions and financial setbacks [38], [8]. The ability of RansomCillin to operate with a marginal impact on overall system performance ensures that users can continue their routine activities without experiencing significant slowdowns or disruptions, an essential aspect for maintaining productivity in a high-paced digital workspace.…”
Section: B Strategic Advancements In Ransomware Mitigationmentioning
confidence: 99%