Expert answer:Solutions to ransomware targeting mobile devices

Solved by verified expert:How does business/indiciduals address their own weaknesses, how do they tackle with the ransomware threats?How does business/individuals maximize their own strengths and opportunities?Require technical details, real world examples.800 words
context.docx

Unformatted Attachment Preview

Mobile Ransomware – The fast Growing Unknown threats
Prepared By:
Team-3
Mayur Jariwala, Nayan Chandra Moturu,
Tejaswi Vemuri, Yankun Chen
ITC 6320 Information Security Technology
Northeastern University
Mobile Ransomware – The fast Growing Unknown threats
Today many people already know what ransomware is and it’s awareness is only growing. Till
time we know the most widespread and most annoying type of desktop ransomware is
the cryptolocker, malware that encrypts your data and offers to restore it if you pay ransom.
Another type of ransomware, the blocker, blocks either browsers or operating systems from
working and demands a ransom to return access. Nowadays, desktop blockers are less widespread
than cryptoransomware, mostly because the latter is more efficient at funneling money into the
hands of criminals.
The threat landscape has now been extended to mobile device now. Here good part is that no
cryptolocker does not exist because an android operating system and application make backups
in the cloud. So users have already backed up file for which no need to pay ransom. So blackhats
would like to have more incentive to attack the Android users.
For the android Blockers are most effective and popular means of ransom. One mobile they act
simply by overlaying the interface of every app with their own, so a victim can’t use any
application at all. PC owners can get rid of a blocker with relative ease as they need to do is just
remove the hard drive, plug into another computer and wipe out the blocker’s file. But this can’t
be done with mobile as you can’t remove the main storage from the phone. This storage is soldered
on the mobile motherboard. This makes hackers to attract to work on blockers for mobile. The
blockers hold 99% of mobile ransomware market.
In 2014–2015 four main actors dominated the mobile ransomware scene which are : Svpeng,
Pletor, Small, and Fusob. Since 2014 the mobile attacks have increased four times and numbers of
victims have doubled from 2.04% to 4.63%. The US was majorly hit by mobile ransomware. The
figures surprised that one out of 10 in Germany and Canada, One in seven in UK, US have been
affected by this kind of mobile ransomware.
Background of ransomware:
Ransomware is a virulent type of malicious software (which means a malware) that restricts people from
accessing their computer or mobile phones, or individual files stored on them. The ransomware program
displays a message that demands payment to restore functionality. The malware, in effect, holds the
computer ransom. In other words, ransomware is an extortion racket.
Traditionally ransomware is malware which gets on to the computer through the infected email attachment.
It will lock the computer and the data in some way and demand payment in exchange for giving your system
control back to you. Ransomware not only locks the system but also encrypts your files and won’t provide
you keys to decrypt them unless you pay. There are 4,000 daily ransomware attacks in 2016. It is up 300%
since 2015. This is a growing trend. Ransomware is a serious business millions of people are making
billions of dollars a year. The most common way to get afflicted by ransomware is by Email.
Mainly malware scam has evolved overtime, using different techniques to disable a computer or mobile
phones or IoT. The recent evolution locks the display and does not allow the user to access their computer
programs.
Mechanism of Ransomware:
The basic concept of file encrypting ransomware was invented and implemented by Young and
Yung. It was known as cryptoviral extortion. Basically Cryptoviral extortion follows three-round
protocol between the attacker and the victim.
1. Attacker to Victim : The attacker generates a key pair and places the corresponding public
key in the malware. Then malware is released.
2. Victim to Attacker: to carry out the attacks, the malware generates a random symmetric
key and encrypts the victim’s data with it. It uses the public key in the malware to encrypt
the symmetric key. This type of encryption known as hybrid encryption and it results in a
small asymmetric ciphetrtext as well as the symmetric victim’s data. It puts up a message
to used that includes the asymmetric ciphertext and how to pay the ransom. The victim
sends the asymmetric ciphertext and e-money to the attacker.
3. Attacker to Victim- The attacker receives the payment, decipher the asymmetric ciphertext
with attacker’s private key and sends the symmetric key to the victim. The victim decipher
the encrypted data with needed symmetric key. This complete the cryptovirology attack.
The symmetric key is randomly generated and will not assist other victims. At no point is the
attacker’s private key exposed to victims and the victim need only send a very small ciphertext
(the encrypted symmetric-cipher key) to the attacker.
How to Protect:

Install applications only from official shops like Google Play. You need to make sure that
no application should be from untrusted source.

Regularly update the device firmware and installed apps.

Install a strong security solution. Even if you’ve installed every updates and downloaded
app from official source, you have not eliminated the risk completely. This ransomware
can lurk in google play and can also spared by exploit kits.
References:
Mobile Ransomware: The Fast Growing Yet Unknown Threat. Retrieved October 16, 2017,
from http://blog.trendmicro.com/mobile-ransomware-fast-growing-yet-unknown-threat/
John, A. S. (n.d.). Smartphone Ransomware Is a Looming Threat. Retrieved October 16, 2017,
from https://www.consumerreports.org/digital-security/smartphone-ransomware-a-loomingthreat/
Kan M, Mobile ransomware use jumps, blocking access to phones.Retrieved October 16, 2017,
from https://www.pcworld.com/article/3090049/security/mobile-ransomware-use-jumpsblocking-access-to-phones.html

Purchase answer to see full
attachment

How it works

  1. Paste your instructions in the instructions box. You can also attach an instructions file
  2. Select the writer category, deadline, education level and review the instructions 
  3. Make a payment for the order to be assignment to a writer
  4.  Download the paper after the writer uploads it 

Will the writer plagiarize my essay?

You will get a plagiarism-free paper and you can get an originality report upon request.

Is this service safe?

All the personal information is confidential and we have 100% safe payment methods. We also guarantee good grades

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more

Order your essay today and save 20% with the discount code ESSAYHELP