Simon Davies S.Davies@napier.ac.uk
Research Student
Evaluation of Live Forensic Techniques in Ransomware Attack Mitigation
Davies, Simon R.; Macfarlane, Richard; Buchanan, William J.
Authors
Rich Macfarlane R.Macfarlane@napier.ac.uk
Associate Professor
Prof Bill Buchanan B.Buchanan@napier.ac.uk
Professor
Abstract
Ransomware continues to grow in both scale, cost, complexity and impact since its initial discovery nearly 30 years ago. Security practitioners are engaged in a continual "arms race" with the ransomware developers attempting to defend their digital infrastructure against such attacks. Recent manifestations of ransomware have started to employ a hybrid combination of symmetric and asymmetric encryption to encode user's files.
This paper describes an investigation that tried to determine if the techniques currently employed in the field of digital forensics could be leveraged to discover the encryption keys used by these types of malicious software thus mitigating the effects of a ransomware attack.
Memory was captured from a system infected by ransomware and its contents was examined using live forensic tools, with the intent of identifying the symmetric encryption keys being used. NotPetya, Bad Rabbit and Phobos hybrid ransomware samples were tested during the investigation. If keys were discovered, the following two steps were also performed. Firstly, a timeline was manually created by combining data from multiple sources to illustrate the ransomware's behaviour as well as showing when the encryption keys were present in memory and how long they remained there. Secondly, an attempt was made to decrypt the files encrypted by the ransomware using the found keys. In all cases, the investigation was able to confirm that it was possible to identify the encryption keys used. A description of how these found keys were then used to successfully decrypt files that had been encrypted during the execution of the ransomware is also given.
The resulting generated timelines provided a excellent way to visualise the behaviour of the ransomware and the encryption key management practices it employed, and from a forensic investigation and possible mitigation point of view, when the encryption keys are in memory.
Citation
Davies, S. R., Macfarlane, R., & Buchanan, W. J. (2020). Evaluation of Live Forensic Techniques in Ransomware Attack Mitigation. Forensic Science International: Digital Investigation, 33, Article 300979. https://doi.org/10.1016/j.fsidi.2020.300979
Journal Article Type | Article |
---|---|
Acceptance Date | Apr 10, 2020 |
Online Publication Date | May 29, 2020 |
Publication Date | 2020-06 |
Deposit Date | May 1, 2020 |
Publicly Available Date | May 30, 2021 |
Journal | Forensic Science International: Digital Investigation |
Electronic ISSN | 2666-2817 |
Publisher | Elsevier |
Peer Reviewed | Peer Reviewed |
Volume | 33 |
Article Number | 300979 |
DOI | https://doi.org/10.1016/j.fsidi.2020.300979 |
Keywords | Live Forensics, Ransomware |
Public URL | http://researchrepository.napier.ac.uk/Output/2657137 |
Files
Evaluation Of Live Forensic Techniques In Ransomware Attack Mitigation
(3.2 Mb)
PDF
You might also like
Approaches to the classification of high entropy file fragments.
(2013)
Journal Article
Formal security policy implementations in network firewalls.
(2011)
Journal Article
Evaluation of the DFET Cloud.
(2015)
Presentation / Conference Contribution
Teaching penetration and malware analysis in a cloud-based environment.
(2015)
Presentation / Conference Contribution
Downloadable Citations
About Edinburgh Napier Research Repository
Administrator e-mail: repository@napier.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search