Araştırma Makalesi
BibTex RIS Kaynak Göster

Analyzing TorrentLocker Ransomware Attacks: A Real Case Study

Yıl 2024, Cilt: 28 Sayı: 4, 774 - 781
https://doi.org/10.16984/saufenbilder.1442756

Öz

Ransomware is malicious software that targets computers, mobile phones, tablets, and other digital devices. These types of software typically encrypt files on the target device, blocking access, and then demand a ransom. TorrentLocker attacks have become particularly popular in recent years, emerging as prominent threats in the realm of cybersecurity. TorrentLocker poses a serious threat to the digital data of users and organizations, exacerbating the financial and reputational damages stemming from cyberattacks. This study provides a framework to understand the target audience, attack strategies, and operations of TorrentLocker ransomware. Conducted through a real case analysis, this examination sheds light on the TorrentLocker attack strategy and elucidates the tracing and identification of the attacker post-attack. The aim of this study is to raise awareness among cybersecurity professionals, organizations, and individual users about TorrentLocker ransomware attacks, aiming to prevent such attacks and track down traces left by the attacker's post-incident. This detailed analysis of TorrentLocker ransomware attacks serves as a crucial resource to enhance protection against future ransomware attacks and contributes to the body of work in this field.

Etik Beyan

no

Destekleyen Kurum

The research was supported by the Cankiri Karatekin University.

Proje Numarası

-

Teşekkür

The authors thank Comodo Group, Inc. USA for providing the malware dataset.

Kaynakça

  • T. Meurs, E. Cartwright, A. Cartwright, M. Junger, A. Abhishta, “Deception in double extortion ransomware attacks: An analysis of profitability and credibility,” Computers & Security, vol. 138, pp. 103670, 2024
  • A. Mukhopadhyay, S. Jain, “A framework for cyber-risk insurance against ransomware: A mixed-method approach,” International Journal of Information Management, vol. 74, pp. 102724. 2024.
  • Malware Statistics, the AV-TEST Institute. [Online]. Available: https://www.av-test.org/en/statistics/malware/, 2024.
  • Malware Statistics, the eset. [Online].https://www.eset.com/za/about/newsroom/press-releases-za/research/torrentlocker-cracked-europe-in-the-sight-of-bitcoin-requesting-ransomware1/, 2024.
  • P. O’Kane, S. Sezer, D. Carlin, “Countering cyber threats for industrial applications: An automated approach for malware evasion detection and analysis,” Journal of Network and Computer Applications, vol. 7, no. 5, pp. 321-327, 2018.
  • P. Sharma, S. Zawar, S. B. Patil, “Ransomware analysis: Internet of Things (Iot) security issues challenges and open problems inthe context of worldwide scenario of security of systems and malware attacks,” In International conference on recent Innovation in Engineering and Management, vol. 2, no. 3, pp. 177-184. 2016.
  • A. Alraizza, A. Algarni, “Ransomware detection using machine learning: A survey. Big Data and Cognitive Computing,” vol. 7, no. 3, pp.143. 2023.
  • M. Cen, F. Jiang, X. Qin, Q. Jiang, R. Doss, “Ransomware early detection: A survey,” Computer Networks, pp. 239, gmr.110138. 2024.
  • K. Begovic, A. Al-Ali, Q. Malluhi, “Cryptographic ransomware encryption detection: Survey,” Computers & Security, pp. 103349, 2023.
  • T., Baker, A. Shortland, “The government behind insurance governance: Lessons for ransomware,” Regulation & Governance, 2023, 17(4), pp. 1000-1020.
  • A. Mukhopadhyay, S. Jain, “A framework for cyber-risk insurance against ransomware: A mixed-method approach,” International Journal of Information Management, pp. 74, gmr.102724, 2024.
  • S. A. Syed, “Industry trends in computer software. In Ethical hacking techniques and countermeasures for cybercrime prevention,” pp. 54-59, 2021.
  • I. Kara, M. Aydos, “The rise of ransomware: Forensic analysis for windows based ransomware attacks. Expert Systems with Applications,” pp.190, gmr.116198, 2022.
Yıl 2024, Cilt: 28 Sayı: 4, 774 - 781
https://doi.org/10.16984/saufenbilder.1442756

Öz

Proje Numarası

-

Kaynakça

  • T. Meurs, E. Cartwright, A. Cartwright, M. Junger, A. Abhishta, “Deception in double extortion ransomware attacks: An analysis of profitability and credibility,” Computers & Security, vol. 138, pp. 103670, 2024
  • A. Mukhopadhyay, S. Jain, “A framework for cyber-risk insurance against ransomware: A mixed-method approach,” International Journal of Information Management, vol. 74, pp. 102724. 2024.
  • Malware Statistics, the AV-TEST Institute. [Online]. Available: https://www.av-test.org/en/statistics/malware/, 2024.
  • Malware Statistics, the eset. [Online].https://www.eset.com/za/about/newsroom/press-releases-za/research/torrentlocker-cracked-europe-in-the-sight-of-bitcoin-requesting-ransomware1/, 2024.
  • P. O’Kane, S. Sezer, D. Carlin, “Countering cyber threats for industrial applications: An automated approach for malware evasion detection and analysis,” Journal of Network and Computer Applications, vol. 7, no. 5, pp. 321-327, 2018.
  • P. Sharma, S. Zawar, S. B. Patil, “Ransomware analysis: Internet of Things (Iot) security issues challenges and open problems inthe context of worldwide scenario of security of systems and malware attacks,” In International conference on recent Innovation in Engineering and Management, vol. 2, no. 3, pp. 177-184. 2016.
  • A. Alraizza, A. Algarni, “Ransomware detection using machine learning: A survey. Big Data and Cognitive Computing,” vol. 7, no. 3, pp.143. 2023.
  • M. Cen, F. Jiang, X. Qin, Q. Jiang, R. Doss, “Ransomware early detection: A survey,” Computer Networks, pp. 239, gmr.110138. 2024.
  • K. Begovic, A. Al-Ali, Q. Malluhi, “Cryptographic ransomware encryption detection: Survey,” Computers & Security, pp. 103349, 2023.
  • T., Baker, A. Shortland, “The government behind insurance governance: Lessons for ransomware,” Regulation & Governance, 2023, 17(4), pp. 1000-1020.
  • A. Mukhopadhyay, S. Jain, “A framework for cyber-risk insurance against ransomware: A mixed-method approach,” International Journal of Information Management, pp. 74, gmr.102724, 2024.
  • S. A. Syed, “Industry trends in computer software. In Ethical hacking techniques and countermeasures for cybercrime prevention,” pp. 54-59, 2021.
  • I. Kara, M. Aydos, “The rise of ransomware: Forensic analysis for windows based ransomware attacks. Expert Systems with Applications,” pp.190, gmr.116198, 2022.
Toplam 13 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Yazılım Mimarisi
Bölüm Araştırma Makalesi
Yazarlar

İlker Kara 0000-0002-9670-8964

Proje Numarası -
Erken Görünüm Tarihi 1 Ağustos 2024
Yayımlanma Tarihi
Gönderilme Tarihi 25 Şubat 2024
Kabul Tarihi 2 Temmuz 2024
Yayımlandığı Sayı Yıl 2024 Cilt: 28 Sayı: 4

Kaynak Göster

APA Kara, İ. (2024). Analyzing TorrentLocker Ransomware Attacks: A Real Case Study. Sakarya University Journal of Science, 28(4), 774-781. https://doi.org/10.16984/saufenbilder.1442756
AMA Kara İ. Analyzing TorrentLocker Ransomware Attacks: A Real Case Study. SAUJS. Ağustos 2024;28(4):774-781. doi:10.16984/saufenbilder.1442756
Chicago Kara, İlker. “Analyzing TorrentLocker Ransomware Attacks: A Real Case Study”. Sakarya University Journal of Science 28, sy. 4 (Ağustos 2024): 774-81. https://doi.org/10.16984/saufenbilder.1442756.
EndNote Kara İ (01 Ağustos 2024) Analyzing TorrentLocker Ransomware Attacks: A Real Case Study. Sakarya University Journal of Science 28 4 774–781.
IEEE İ. Kara, “Analyzing TorrentLocker Ransomware Attacks: A Real Case Study”, SAUJS, c. 28, sy. 4, ss. 774–781, 2024, doi: 10.16984/saufenbilder.1442756.
ISNAD Kara, İlker. “Analyzing TorrentLocker Ransomware Attacks: A Real Case Study”. Sakarya University Journal of Science 28/4 (Ağustos 2024), 774-781. https://doi.org/10.16984/saufenbilder.1442756.
JAMA Kara İ. Analyzing TorrentLocker Ransomware Attacks: A Real Case Study. SAUJS. 2024;28:774–781.
MLA Kara, İlker. “Analyzing TorrentLocker Ransomware Attacks: A Real Case Study”. Sakarya University Journal of Science, c. 28, sy. 4, 2024, ss. 774-81, doi:10.16984/saufenbilder.1442756.
Vancouver Kara İ. Analyzing TorrentLocker Ransomware Attacks: A Real Case Study. SAUJS. 2024;28(4):774-81.

30930 This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.