2022
DOI: 10.31154/cogito.v8i1.356.232-243
|View full text |Cite
|
Sign up to set email alerts
|

LockBit 2.0 Ransomware: Analysis of infection, persistence, prevention mechanism

Abstract: This research was carried out due to the prevalence of ransomware attacks, especially in Indonesia against data located at Endpoints, in early 2022 ransomware was enough to horrify the news in cyberspace and one of the ransomware that is quite worrying in Indonesia is LockBit 2.0 ransomware, so research is needed against the ransomware. The method used to research the ransomware is static analysis and dynamic analysis which will show the infection and persistence of the LockBit 2.0 ransomware, the static analy… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(11 citation statements)
references
References 12 publications
0
11
0
Order By: Relevance
“…LockBit uses several mechanisms to encrypt files and to evade from detection and other monitoring tools. It has four versions 15 that have different, individual behavior. It encrypts files with random extensions like .d2cE9C214, .kw33XQBp8, etc.…”
Section: Discussion and Surveymentioning
confidence: 99%
“…LockBit uses several mechanisms to encrypt files and to evade from detection and other monitoring tools. It has four versions 15 that have different, individual behavior. It encrypts files with random extensions like .d2cE9C214, .kw33XQBp8, etc.…”
Section: Discussion and Surveymentioning
confidence: 99%
“…Malware visualization, automatic feature extraction, and classification were all provided by MalFCS [ 29 ], a malware categorization mechanism. The malware binaries are represented as entropy graphs by the framework, which uses convolutional neural networks with deep layers to extract features.…”
Section: Related Workmentioning
confidence: 99%
“…The use of game theory and multi-tier streaming analytics models has been investigated to enhance the detection of 0-day ransomware attacks using machine learning [ 27 , 28 ]. Likewise, the analysis of ransomware attack behaviors and the development of prevention mechanisms have been crucial in understanding the impact of ransomware, such as the LockBit 2.0 ransomware, and devising strategies to avoid such attacks [ 29 ]. Additionally, the use of predictive analysis and context-aware AI in IoT systems has been proposed to predict and detect ransomware penetration attempts in resource-constrained IoT environments [ 30 ].…”
Section: Introductionmentioning
confidence: 99%
“…iv. LockBit [29] is a file-encrypting ransomware that uses a combination of RSA and AES encryption algorithms to encrypt the victim's files. Once the files are encrypted, the ransomware displays a ransom note, demanding payment in exchange for the decryption key.…”
Section: Focused Ransomware Variantsmentioning
confidence: 99%