Dual-use Research in Ransomware Attacks: A Discussion on Ransomware Defence Intelligence

0Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Previous research has shown that developers rely on public platforms and repositories to produce functional but insecure code. We looked into the matter for ransomware, enquiring whether also ransomware engineers re-use the work of others and produce insecure code. By methodically reverse-engineering 128 malware executables, we have found that, out of 21 ransomware samples, 9 contain copy-paste code from public resources. Thanks to this finding, we managed to retrieve the decryption keys with which to nullify the ransomware attacks. From this fact, we recall critical cases of code disclosure in the recent history of ransomware and, arguing that ransomware are components in cyber-weapons, reflect on the dual-use nature of this research. We further discuss benefits and limits of using cyber-intelligence and counter-intelligence strategies that could be used against this threat.

Cite

CITATION STYLE

APA

Genc, Z. A., & Lenzini, G. (2020). Dual-use Research in Ransomware Attacks: A Discussion on Ransomware Defence Intelligence. In International Conference on Information Systems Security and Privacy (pp. 585–592). Science and Technology Publications, Lda. https://doi.org/10.5220/0009000505850592

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free