RAN
RAN
1.1. Ransomware
Ransomware is malicious software designed to encrypt or lock data until a ransom is paid. It has evolved into
different types over time:
The evolution of ransomware reflects a shift toward more sophisticated attacks, with the WannaCry
ransomware attack in May 2017 serving as a landmark event due to its unprecedented scale and rapid
propagation.
Timeline: The WannaCry attack began on May 12, 2017, and infected over 200,000 systems in 150
countries within a single day.
Mechanism:
o Exploited the SMBv1 protocol vulnerability using EternalBlue, a leaked NSA tool.
o Used DoublePulsar to install its payload and propagate rapidly.
Impact:
o Estimated financial losses of over $4 billion.
o Industries affected included healthcare (notably the UK’s NHS), telecommunications, and
logistics.
This approach uses predefined patterns or signatures of known ransomware to identify threats.
Advantages:
o High accuracy for previously identified ransomware variants.
o Fast and computationally efficient.
Limitations:
o Ineffective against new variants or polymorphic ransomware.
o Requires regular updates of signature databases.
Static analysis examines the ransomware’s code and structure without executing it.
Techniques:
o Disassemblers and decompilers to analyze code.
o Hash-based comparisons for detecting known samples.
o Identifying embedded strings, API calls, or encryption algorithms.
Advantages:
o Safe as the malware is not executed.
o Useful for initial classification and understanding.
Limitations:
o Ineffective against heavily obfuscated or encrypted malware.
Techniques:
o Sandboxing to monitor execution.
o Tools to capture network traffic, system modifications, and file access patterns.
Advantages:
o Provides real-time insights into ransomware behavior.
o Effective against obfuscated malware.
Limitations:
o Risk of escape from the sandbox environment.
o Resource-intensive and time-consuming.
Common algorithms:
o Decision Trees and Random Forests: Useful for feature importance analysis.
o Support Vector Machines (SVM): Effective for smaller datasets.
Applications:
o Detecting suspicious patterns in file operations, network activity, or API calls.
Common techniques:
o Clustering (e.g., K-Means): Identifies outliers in system behaviors.
o Autoencoders: Detect deviations in network traffic or file access patterns.
Applications:
o Identifying zero-day ransomware or unusual encryption patterns.
Techniques:
o Convolutional Neural Networks (CNNs): Analyzing file signatures or packet captures.
o Recurrent Neural Networks (RNNs): Detecting sequential patterns in API calls or logs.
Applications:
o High accuracy in detecting ransomware behavior but requires significant computational
resources.
Data Availability:
o Need large, diverse datasets for training.
o Limited access to real-world ransomware samples due to ethical and security concerns.
Feature Engineering:
o Extracting meaningful features from ransomware behavior requires expertise.
Adversarial Attacks:
o Attackers may design ransomware to evade ML-based detection.
Computational Overhead:
o Training and deploying models can be resource-intensive.
6. Conclusion
While traditional models have been instrumental in detecting WannaCry and similar ransomware, their
limitations in adaptability and scalability have paved the way for ML-based approaches. Static and dynamic
analysis methods play a crucial role in enhancing detection capabilities, providing foundational insights for both
traditional and machine learning models. The integration of these methods, leveraging the strengths of
traditional models for rapid detection and ML for adaptability, offers a promising hybrid solution.
Security professionals and tools use behavior-based detection techniques that compare new behaviours to historical
data to look for evidence of compromise by comparing recent activity to typical behavioural baselines. When an
employee checks in from the workplace, is their corporate PC being accessed remotely from another state on the same
day? Three of them are listed below.
File system changes:abnormal file operations, including an excessive number of file renames
Traffic analysis:Check traffic for oddities such software connections to dubious file-sharing websites_and the times of
such activities.
API calls:A third behavior-based tactic that security teams may employ is auditing API calls.