Skip to main content

Overinfection in Ransomware

  • Conference paper
  • First Online:
Security in Computing and Communications (SSCC 2018)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 969))

Included in the following conference series:

Abstract

Ransomware, the kind of malicious software that prevents users from accessing their data and demands payment of a ransom, in order to give this access back, has become a fast growing problem among computer users. This is why several papers in this field have focused on the ways of detecting it or on describing the infection and encryption processes. Our paper examines the ransomware from another point of view by describing an interesting property of it, namely, the overinfection management, or the way of handling multiple infections on the same target. We show that the overinfection in ransomware can have four levels: Level 0 to ensure that the ransomware is not executed twice at the same time on the same machine, Level 1 to avoid re-encrypting its encrypted files, Level 2 to coordinate between its infections on the same machine and Level 3 to manage the infection between many target machines in the same computer park.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    In [7] the authors discuss the ransomware as a cryptovirus. Generally, a ransomware does not perform the viral process as it is defined by Cohen [4]. We prefer to change the word virus to malware or infection as it is defined by Adelman [2].

  2. 2.

    Usually, Level 2 of overinfection is managed by a specified key/value in the registry keys or a hidden file in a specified directory. For example, in the user’s profile directory. We will discuss later the difference by using that in Level 0 and Level 2 of overinfection.

  3. 3.

    After the first infection, the ransomware makes a copy and puts it inside any accessible shared directory of the other machines in this computer park.

  4. 4.

    The computer park is noted by its fixed device d mentioned in the previous section.

  5. 5.

    An infected file/machine moved from another computer park \(d'\) has not any effect on the infection process in d.

References

  1. Sood, A.K., Enbody, R.: Malware design strategies for circumventing detection and prevention controls. Virus Bulletin (2012)

    Google Scholar 

  2. Adleman, L.M.: An abstract theory of computer viruses. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 354–374. Springer, New York (1990). https://doi.org/10.1007/0-387-34799-2_28

    Chapter  Google Scholar 

  3. Cimpanu, C.: Wana decrypt0r ransomware using NSA exploit leaked by shadow brokers is on a rampage (2017). https://www.bleepingcomputer.com/news/security/wana-decrypt0r-ransomware-using-nsa-exploit-leaked-by-shadow-brokersis-on-a-rampage/. bleepingcomputer blog

  4. Cohen, F.: Computer viruses. Comput. Secur. 6(1), 22–35 (1987)

    Article  Google Scholar 

  5. Continella, A., et al.: ShieldFS: a self-healing, ransomware-aware filesystem. In: Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, 5–9 December 2016, pp. 336–347 (2016)

    Google Scholar 

  6. Filiol, E.: Formalisation and implementation aspects of k-ary (malicious) codes. J. Comput. Virol. 3(2), 75–86 (2007)

    Article  Google Scholar 

  7. Gazet, A.: Comparative analysis of various ransomware virii. J. Comput. Virol. 6(1), 77–90 (2010)

    Article  Google Scholar 

  8. Kharraz, A., Arshad, S., Mulliner, C., Robertson, W.K., Kirda, E.: UNVEIL: a large-scale, automated approach to detecting ransomware. In: 25th USENIX Security Symposium, USENIX Security 16, Austin, 10–12 August 2016, pp. 757–772 (2016)

    Google Scholar 

  9. Kharraz, A., Robertson, W., Balzarotti, D., Bilge, L., Kirda, E.: Cutting the gordian knot: a look under the hood of ransomware attacks. In: Almgren, M., Gulisano, V., Maggi, F. (eds.) DIMVA 2015. LNCS, vol. 9148, pp. 3–24. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-20550-2_1

    Chapter  Google Scholar 

  10. Kolodenker, E., Koch, W., Stringhini, G., Egele, M.: PayBreak: defense against cryptographic ransomware. In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, 2–6 April 2017, pp. 599–611 (2017)

    Google Scholar 

  11. Lemmou, Y., Souidi, E.M.: PrincessLocker analysis. In: International Conference on Cyber Security and Protection of Digital Services (Cyber Security), pp. 1–10, June 2017

    Google Scholar 

  12. Lemmou, Y., Souidi, E.M.: An overview on Spora ransomware. In: Thampi, S.M., Martínez Pérez, G., Westphall, C.B., Hu, J., Fan, C.I., Gómez Mármol, F. (eds.) SSCC 2017. CCIS, vol. 746, pp. 259–275. Springer, Singapore (2017). https://doi.org/10.1007/978-981-10-6898-0_22

    Chapter  Google Scholar 

  13. MSDN: Createmutex function. https://msdn.microsoft.com/fr-fr/library/windows/desktop/ms682411%28v=vs.85%29.aspx

  14. Scaife, N., Carter, H., Traynor, P., Butler, K.R.B.: CryptoLock (and drop it): stopping ransomware attacks on user data. In: 36th IEEE International Conference on Distributed Computing Systems, ICDCS 2016, Nara, 27–30 June 2016, pp. 303–312 (2016)

    Google Scholar 

  15. Shivale, S.A.: Cryptovirology: Virus approach. CoRR abs/1108.2482 (2011). http://arxiv.org/abs/1108.2482

  16. Young, A., Yung, M.: Cryptovirology: extortion-based security threats and countermeasures. In: Proceedings 1996 IEEE Symposium on Security and Privacy, pp. 129–140, May 1996

    Google Scholar 

  17. Young, A.L.: Cryptoviral extortion using Microsoft’s crypto API. Int. J. Inf. Secur. 5(2), 67–76 (2006)

    Article  Google Scholar 

Download references

Acknowledgements

We thank Dr. Vesselin Bontchev and Dr. Afaf Hamzaoui for their useful remarks and suggestions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yassine Lemmou .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Lemmou, Y., Souidi, E.M. (2019). Overinfection in Ransomware. In: Thampi, S., Madria, S., Wang, G., Rawat, D., Alcaraz Calero, J. (eds) Security in Computing and Communications. SSCC 2018. Communications in Computer and Information Science, vol 969. Springer, Singapore. https://doi.org/10.1007/978-981-13-5826-5_39

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-5826-5_39

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-5825-8

  • Online ISBN: 978-981-13-5826-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics