Ransomware: Evolution, Target and Safety Measures

Authors

  • AK Maurya Department of Information Technology, IET, Dr. Ram Manohar Lohia Avadh University, Faizabad, India
  • N Kumar Department of Information Technology, SIST, BBAU Lucknow, India
  • A Agrawal Department of Information Technology, SIST, BBAU Lucknow, India
  • RA Khan Department of Information Technology, SIST, BBAU Lucknow, India

DOI:

https://doi.org/10.26438/ijcse/v6i1.8085

Keywords:

Ransomware, attack, Cryptowall, Cryptolock, Wannacry

Abstract

Security was a big deal for a long time. With the viruses, malware and ransomware are another problems seen by the practitioner. This paper shows working of ransomware with its evolution and general characteristics of few popular ransomware. In evolution part, the paper provides s study from first ransomware to current days. The study shows the light on various kind of infection performed by a ransomware including data infection and infected machine. Different attackers made choices to the target various attack; the paper provides a sight on various target types of the ransomware. This paper trying to demonstrate few ransomware attacks case studies to show the problem created by various ransomware as an example. After an attack, what a victim should do after infection is also discussed at the end of the paper. How people can save their system and what are the safety measures to save the system from ransomware, are also discussed by the researcher. At the end of the paper, the researcher points out few steps to save systems and data.

References

[1] R. Richardson and M. Nort, Ransomware: Evolution, Mitigation and Prevention”, International Management Review, Vol. 13, No. 1 2017.

[2] An Osterman Research, “Best Practices for Dealing With Phishing and Ransomware SPON”, White Paper Published September 2016.

[3] C.Beek and A. Furtak, “Targeted ransomware No Longer a Future Threat: Analysis of a targeted and manual ransomware campaign”, Advanced Threat Research, Intel security, feb2016.

[4] J. Wyke and A. Ajjan, “The Current State of Ransomware”, A SophosLabs technical paper December 2015.

[5] WannaCry Response, Metasys, Johnson Control, June 2017.

[6] WannaCry Rensomware Analysis, White paper, May 2017, Stream scan.

[7] B. N. Giri, N. Jyoti, Mc. A. AVERT, AVAR 2006, Auckland.

http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.169.5881&rep=rep1&type=pdf

[8] P. Bihola, R. Sheth, “Emerging Threats of 2017: Ransomware, IOC’s”, International Journal of Scientific Research in Computer Science, Engineering and Information Technology, Volume 2 | Issue 6, pp.-996-1003.

[9] P.H. Rughani, Data recovery from ransomware affectedandroid phone using forensic tools, vo.-5, issue-8, International Journal of Computer science and Engineering, pp. 67-70.

Downloads

Published

2025-11-12
CITATION
DOI: 10.26438/ijcse/v6i1.8085
Published: 2025-11-12

How to Cite

[1]
A. Maurya, N. Kumar, A. Agrawal, and R. Khan, “Ransomware: Evolution, Target and Safety Measures”, Int. J. Comp. Sci. Eng., vol. 6, no. 1, pp. 80–86, Nov. 2025.

Issue

Section

Research Article