2023
DOI: 10.1109/access.2023.3322427
|View full text |Cite
|
Sign up to set email alerts
|

Similarity Analysis of Ransomware Attacks Based on ATT&CK Matrix

Zheyu Song,
Yonghong Tian,
Junjin Zhang

Abstract: In recent years, there has been an increasingly prevalent trend of ransomware attacks, with malicious organizations employing various techniques to gain system privileges and subsequently engaging in extortion through methods such as encrypting files or leaking information. Current research predominantly focuses on the analysis of ransomware using existing features, but there has been scarce exploration of the behavioral patterns associated with ransomware attacks. In light of this situation, we propose a rans… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 26 publications
0
1
0
Order By: Relevance
“…Ransomware attacks succeed due to a confluence of factors including the accessibility of conducting attacks globally supported by the affordability of basic computing resources and digital currency transactions; insufficient cybersecurity education within organizations leaving personnel vulnerable to phishing and other cyber threats; weaknesses in email filtering and inadequate training, enabling the rapid spread of ransomware within organizational networks; cybercriminals operating from jurisdictions with limited international legal oversight; unregulated cryptocurrency payments providing anonymity to attackers; the willingness of some organizations to pay ransoms discreetly; a low prosecution rate for cybercrime, creating a favorable risk-reward ratio for criminals; the emergence of ransomware-as-a-service (RaaS), simplifying attacks for individuals without technical expertise; and large deficiencies in patching vendor-supplied software, emphasizing the crucial need for proactive cybersecurity measures [19].…”
Section: Identifying the Contributors To A Ransomware Attackmentioning
confidence: 99%
“…Ransomware attacks succeed due to a confluence of factors including the accessibility of conducting attacks globally supported by the affordability of basic computing resources and digital currency transactions; insufficient cybersecurity education within organizations leaving personnel vulnerable to phishing and other cyber threats; weaknesses in email filtering and inadequate training, enabling the rapid spread of ransomware within organizational networks; cybercriminals operating from jurisdictions with limited international legal oversight; unregulated cryptocurrency payments providing anonymity to attackers; the willingness of some organizations to pay ransoms discreetly; a low prosecution rate for cybercrime, creating a favorable risk-reward ratio for criminals; the emergence of ransomware-as-a-service (RaaS), simplifying attacks for individuals without technical expertise; and large deficiencies in patching vendor-supplied software, emphasizing the crucial need for proactive cybersecurity measures [19].…”
Section: Identifying the Contributors To A Ransomware Attackmentioning
confidence: 99%