Evaluation of Live Forensic Techniques in Ransomware Attack Mitigation

12/15/2020
by   Simon R. Davies, et al.
0

Memory was captured from a system infected by ransomware and its contents was examined using live forensic tools, with the intent of identifying the symmetric encryption keys being used. NotPetya, Bad Rabbit and Phobos hybrid ransomware samples were tested during the investigation. If keys were discovered, the following two steps were also performed. Firstly, a timeline was manually created by combining data from multiple sources to illustrate the ransomware's behaviour as well as showing when the encryption keys were present in memory and how long they remained there. Secondly, an attempt was made to decrypt the files encrypted by the ransomware using the found keys. In all cases, the investigation was able to confirm that it was possible to identify the encryption keys used. A description of how these found keys were then used to successfully decrypt files that had been encrypted during the execution of the ransomware is also given. The resulting generated timelines provided a excellent way to visualise the behaviour of the ransomware and the encryption key management practices it employed, and from a forensic investigation and possible mitigation point of view, when the encryption keys are in memory.

READ FULL TEXT

page 7

page 8

page 9

research
01/07/2019

Extracting Secrets from Encrypted Virtual Machines

AMD SEV is a hardware extension for main memory encryption on multi-tena...
research
07/17/2020

Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: An Extended Survey

New cryptographic techniques such as homomorphic encryption (HE) allow c...
research
07/27/2019

Deriving ChaCha20 Key Streams From Targeted Memory Analysis

There can be performance and vulnerability concerns with block ciphers, ...
research
01/19/2019

Weak Keys and Cryptanalysis of a Cold War Block Cipher

T-310 is a cipher that was used for encryption of governmental communica...
research
01/13/2018

Secrecy Amplification for Distributed Encrypted Sources with Correlated Keys using Affine Encoders

This paper proposed the application of post-encryption-compression (PEC)...
research
05/17/2019

Pretty Modular Symmetric Encryption (PMSE), compact algorithm for "embedded cryptography" with quite low computational cost

Nowadays, the dataflux shared between IOT systems must be secured from 8...
research
11/22/2020

Electt: running auditable and verifiable elections in untrusted environments

We present a system for running auditable and verifiable elections in un...

Please sign up or login with your details

Forgot password? Click here to reset