«Міжнародна економіка та менеджмент», 1 курс
ДВНЗ «Київський національний економічний університет імені Вадима Гетьмана»
Науковий керівник – к.ю.н., професор кафедри теорії та історії права Мачуський В.В.
It is an undeniable fact that cybercrime and, in particular, ransomware attacks are a real threat to network users, what confirms the relevance of this issue. At the same time, the main threat is that not only regular users of the network are harmed, but also large companies whose activities are impossible without modern technology, computers and data storage on the Internet.
This has interested us as researchers, so in the process of writing, based on the analysis of available materials, we identified the main types of virus and investigated the measures that should be taken in case you are the victim of an attack, as well as the measures taken by the government to protect citizens from cyber-fraud.
The purpose of the given work is to carry out the research of the given type of a computer virus, spheres of its influence, the most scale cases of application of the given program and definition of methods of protection against similar threats.
The relevance of the topic
The relevance of the topic is due to the constant expansion of the spheres of application of modern technology in all spheres of human life, the emergence of new requirements of mankind to computers and technical safety in connection with the development of this area.
In the course of the research, the following tasks were performed: analysis of sources on the subject, identification of types of ransomware attacks on the basis of the conducted research, development of algorithms of protection against the given threat with the application of various methods and programs and search of rules for the regulation of their activity in the legal sphere.
Writing this work would have been impossible without the use of such research methods: the analysis was necessary for the processing of material on the topic, the system approach was used to clearly structure the results of the study, the comparison was used to isolate the necessary information from the general array, on the basis of which the classification of types of ransomware attacks was made.
A review of the literature
A review of the literature on the topic showed that ransomware attacks by hackers pose a very high threat because of their serious training and profit orientation. Such attacks have clear goals, a specific plan of action and the attackers use the most modern and effective tools to implement them.
Through a sophisticated attack, attackers gain global administrator rights and full control over their IT infrastructure. For an organization, this can result in business stoppages, financial losses, and reputational risks. Also particularly important for writing this work was an analysis of the Law № 2163-VІІІ “On the basic principles of cybersecurity in Ukraine”.
Especially important during the research was the report “CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data”, jointly written by 4 American scientists (Nolen Scaife, Henry Carter, Patrick Traynor, Kevin R.B. Butler).
In this report, the threats posed by virus attacks were discussed in particular detail, and the methods for combating this problem were clearly structured. In this paper, scientists presented the program “CryptoDrop”, an early-warning detection system that alerts a user during suspicious file activity.
The topic of our research is quite extensive, but, based on the tasks set, we were able to solve some aspects of the problem and get certain results of our research.
The world’s first computer took up a whole room. Since its creation, one generation of people and thousands of models have changed. Today, a personal computer is a familiar and actually necessary thing. It is in it are stored terabytes of personal information and other work data. And hackers have learned how to evaluate such data in cryptographic software.
Currently, most ransomware attacks are aimed at stealing or compromising user credentials, which hackers use to spread to other PCs and servers in the organization while collecting other credentials and increasing their rights.
Back in 1989, with the advent of the first ransomware virus, network security became a rather shaky concept. Over the years, extortionist hackers created new viruses and more and more attacks were successful. Attacks by extortionists of all kinds have become a real threat over this long period of time.
Therefore, in order to create an algorithm of actions and methods that will allow you to secure your activities in the network, we have investigated this issue and presented this list of actions in the third chapter.
Thus, after the work carried out, we can say that nowadays the very concept of cybersecurity has become much broader. Our country is taking steps towards the legal designation of the cyber threat and the legal regulation of this sphere.
We cannot overlook the hacker attacks of this type, because ransomware attacks are a real threat to the modern world. However, we must realize that if we follow a simple algorithm, it is certainly possible to protect ourselves from such attacks.
1. Nolen Scaife, Henry Carter, Patrick Traynor, Kevin R.B. Butler. CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data. In IEEE 36th International Conference on Distributed Computing Systems, 2016.
2. X. Chen, J. Andersen, Z. M. Mao, M. Bailey, J. Nazario. Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware. In IEEE International Conference on Dependable Systems and Networks, 2008.
3. https://www.economist.com/international/2015/01/15/your-money-or-your-data, The Economist, Jan 17th 2015
4. Law № 2163-VІІІ “On the basic principles of cybersecurity in Ukraine, 2017.