International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064




Downloads: 3

Research Paper | Information Security | India | Volume 11 Issue 1, January 2022


Deriving Ransomware Formulation Complexity and Compromisation Topology

Ujas Dhami [3] | Nisarg Shah [3]


Abstract: The Ransomware family, notably, is outspreading itself amongst major organizations and institutions. The family has gained several of its members in the recent two years, increasing the infection rate by 68.5%, as per Statista?s Annual Ransomware report. Investigation: This paper demonstrates ransomware created by the authors in a testing lab with the use of Python, acquainting the ease of developing the malware and deploying it into remote machines. Method: The Ransomware is constructed from utilizing already available python libraries, inside a python environment. The Ransomware is deployed into a remote machine, along with a Reverse Channelized Socket connection, and cryptographic keys are exchanged to maintain access and to supply the attacker with the decryption key, upon a successful compromise. Principle Result: Heuristics performed by the ransomware to compromise the system derive a similar methodology used by sophisticated ransomware to carry out organizational attacks. Domestic ransomware made with python libraries is as effective as other members of the family.


Keywords: Ransomware, Ransomware Family, Enterprise Security, Threat Actors and Adversaries, System Administration


Edition: Volume 11 Issue 1, January 2022,


Pages: 807 - 812

Deriving Ransomware Formulation Complexity and Compromisation Topology


How to Cite this Article?

Ujas Dhami, Nisarg Shah, "Deriving Ransomware Formulation Complexity and Compromisation Topology", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=SR22114182357, Volume 11 Issue 1, January 2022, 807 - 812, #ijsrnet

How to Share this Article?

Enter Your Email Address






Top