Ransomware: Analysing the Impact on Windows Active Directory Domain Services

by   Grant McDonald, et al.

Ransomware has become an increasingly popular type of malware across the past decade and continues to rise in popularity due to its high profitability. Organisations and enterprises have become prime targets for ransomware as they are more likely to succumb to ransom demands as part of operating expenses to counter the cost incurred from downtime. Despite the prevalence of ransomware as a threat towards organisations, there is very little information outlining how ransomware affects Windows Server environments, and particularly its proprietary domain services such as Active Directory. Hence, we aim to increase the cyber situational awareness of organisations and corporations that utilise these environments. Dynamic analysis was performed using three ransomware variants to uncover how crypto-ransomware affects Windows Server-specific services and processes. Our work outlines the practical investigation undertaken as WannaCry, TeslaCrypt, and Jigsaw were acquired and tested against several domain services. The findings showed that none of the three variants stopped the processes and decidedly left all domain services untouched. However, although the services remained operational, they became uniquely dysfunctional as ransomware encrypted the files pertaining to those services


page 2

page 5

page 14

page 17

page 18

page 20

page 22

page 25


Duplication of Windows Services

OS-level virtualization techniques virtualize system resources at the sy...

Virtualizing System and Ordinary Services in Windows-based OS-Level Virtual Machines

OS-level virtualization incurs smaller start-up and run-time overhead th...

Cloud Storage Forensic: hubiC as a Case-Study

In today society where we live in a world of constant connectivity, many...

Detecting Forged Kerberos Tickets in an Active Directory Environment

Active Directory is the most popular service to manage users and devices...

spotFuzzer: Static Instrument and Fuzzing Windows COTs

The security research on Windows has received little attention in the ac...

An Inverse Approach to Windows' Resource-Based Permission Mechanism for Access Permission Vulnerability Detection

In organizations, employees work with information stored in files accord...

Understanding and Mitigating Banking Trojans: From Zeus to Emotet

Banking Trojans came a long way in the past decade, and the recent case ...

Please sign up or login with your details

Forgot password? Click here to reset