Ranflood: A mitigation tool based on the principles of data flooding against ransomware

Crypto-ransomware aims at extorting money from users by encrypting their files and asking them to pay for the decryption key. We present Ranflood; a configurable drop-in solution that contrasts ransomware attacks with a deluge of decoy files at specific locations (e.g., sensitive folders of the user...

Descrizione completa

Dettagli Bibliografici
Autori principali: Davide Berardi, Saverio Giallorenzo, Andrea Melis, Simone Melloni, Marco Prandini
Natura: Articolo
Lingua:English
Pubblicazione: Elsevier 2024-02-01
Serie:SoftwareX
Soggetti:
Accesso online:http://www.sciencedirect.com/science/article/pii/S2352711023003011
Descrizione
Riassunto:Crypto-ransomware aims at extorting money from users by encrypting their files and asking them to pay for the decryption key. We present Ranflood; a configurable drop-in solution that contrasts ransomware attacks with a deluge of decoy files at specific locations (e.g., sensitive folders of the user, the attack site), deceiving the attacker into encrypting sacrificial files. Ranflood further slows down the attack by contending with the malware access to IO and computation resources of the targeted machine. The aim is to buy time for the defence team to take action (e.g., manually shutting down an unresponsive machine). We show how the extensibility and modularity of Ranflood’s software architecture (1) can accommodate a wide spectrum of flooding strategies, easing the process of improving its effectiveness also against future ransomware families and (2) strive to maximise the tool’s efficiency by exploiting the highest level of parallelism afforded by the attacked machine.
ISSN:2352-7110