Ransomware is malicious software that targets computers, mobile phones, tablets, and other digital devices. These types of software typically encrypt files on the target device, blocking access, and then demand a ransom. TorrentLocker attacks have become particularly popular in recent years, emerging as prominent threats in the realm of cybersecurity. TorrentLocker poses a serious threat to the digital data of users and organizations, exacerbating the financial and reputational damages stemming from cyberattacks. This study provides a framework to understand the target audience, attack strategies, and operations of TorrentLocker ransomware. Conducted through a real case analysis, this examination sheds light on the TorrentLocker attack strategy and elucidates the tracing and identification of the attacker post-attack. The aim of this study is to raise awareness among cybersecurity professionals, organizations, and individual users about TorrentLocker ransomware attacks, aiming to prevent such attacks and track down traces left by the attacker's post-incident. This detailed analysis of TorrentLocker ransomware attacks serves as a crucial resource to enhance protection against future ransomware attacks and contributes to the body of work in this field.
no
The research was supported by the Cankiri Karatekin University.
-
The authors thank Comodo Group, Inc. USA for providing the malware dataset.
-
Birincil Dil | İngilizce |
---|---|
Konular | Yazılım Mimarisi |
Bölüm | Araştırma Makalesi |
Yazarlar | |
Proje Numarası | - |
Erken Görünüm Tarihi | 1 Ağustos 2024 |
Yayımlanma Tarihi | 31 Ağustos 2024 |
Gönderilme Tarihi | 25 Şubat 2024 |
Kabul Tarihi | 2 Temmuz 2024 |
Yayımlandığı Sayı | Yıl 2024 Cilt: 28 Sayı: 4 |
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.