Preprint Review Version 1 This version is not peer-reviewed

In-Depth Analysis and Countermeasures for Ransomware Attacks: Case Studies and Recommendations

Version 1 : Received: 29 August 2024 / Approved: 30 August 2024 / Online: 2 September 2024 (11:08:49 CEST)

How to cite: Seng, Y. J.; Cen, T. Y.; Raslan, M. A. H. B. M.; Subramaniam, M. R.; Xin, L. Y.; Kin, S. J.; Long, M. S.; Sindiramutty, S. R. In-Depth Analysis and Countermeasures for Ransomware Attacks: Case Studies and Recommendations. Preprints 2024, 2024082261. https://doi.org/10.20944/preprints202408.2261.v1 Seng, Y. J.; Cen, T. Y.; Raslan, M. A. H. B. M.; Subramaniam, M. R.; Xin, L. Y.; Kin, S. J.; Long, M. S.; Sindiramutty, S. R. In-Depth Analysis and Countermeasures for Ransomware Attacks: Case Studies and Recommendations. Preprints 2024, 2024082261. https://doi.org/10.20944/preprints202408.2261.v1

Abstract

Ransomware, a combination of "ransom" and "malware," is a type of malicious software designed to encrypt or block access to a victim's data or system, demanding a ransom for its release Initially targeting individuals, ransomware has evolved to attack businesses for greater financial gain. It mainly exists in two forms: encrypting ransomware, which holds data hostage, and non-encrypting ransomware, which blocks system access and displays a ransom note. The energy sector has been notably targeted by ransomware, exemplified by the 2021 attack on Colonial Pipeline by the DarkSide group, which led to a temporary shutdown and a significant fuel shortage on the US East Coast. Similarly, in 2023, Russian hackers using LockBit ransomware disrupted Royal Mail, halting international deliveries and incurring millions in recovery costs despite no ransom payment. These incidents underscore the need for comprehensive cybersecurity strategies that combine human vigilance with advanced technologies like AI and machine learning. By adopting a multi-layered protection approach, organizations can better prepare for and mitigate the risks posed by ransomware attacks safeguarding sensitive data and ensuring business continuity.

Keywords

ransomware; cybersecurity; case studies; security issues; countermeasures

Subject

Computer Science and Mathematics, Computer Science

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.