z-logo
open-access-imgOpen Access
Demystifying Ransomware Attacks: Reverse Engineering and Dynamic Malware Analysis of WannaCry for Network and Information Security
Author(s) -
Aaron Zimba,
Luckson Simukonda,
Mumbi Chishimba
Publication year - 2017
Publication title -
zambia ict journal
Language(s) - English
Resource type - Journals
ISSN - 2616-2156
DOI - 10.33260/zictjournal.v1i1.19
Subject(s) - ransomware , computer security , malware , encryption , malware analysis , computer science , reverse engineering , the internet , ransom , cryptography , internet privacy , world wide web , law , operating system , political science
Encryption has protected the Internet for some time now and it has come to raise user trust on the otherwise unsecure Internet. However, recent years have seen the use of robust encryption as stepping stone for cyber-criminal activities. Ransomware has not escaped the headlines even as it has attacked almost every sector of the society using a myriad of infection vectors. Mission critical data has been held to ransom and victims have had to part away with millions of dollars. The advent of the anonymous Bitcoin network has made matters worse where it’s been virtually infeasible to trace the perpetrators. In this paper, we endeavor to perform dynamic analysis of WannaCry ransomware samples based on malwarefree infection vectors. Further, we perform reverse-engineering to dissect the ransomware code for further analysis. Results show that despite the use of resilient encryption, the ransomware like other families in the wild uses the same attack structure and cryptographic primitives. Our analysis leads us to the conclusion that this ransomware strain isn't as complex as previously reported. This detailed practical analysis tries to raise awareness to the business community on the realities and importance of IT security whilst hinting on prevention, recovery and the limitations thereof.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here