Dual-Use Research In Ransomware Attacks: A Discussion on Ransomware Defence Intelligence
English
Genç, Ziya Alper[University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > >]
Lenzini, Gabriele[University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > >]
2020
Proceedings of the 6th International Conference on Information Systems Security and Privacy
SciTePress
Volume 1
585-592
Yes
No
International
978-989-758-399-5
Setúbal
Portugal
6th International Conference on Information Systems Security and Privacy (ICISSP 2020)
25-27 February 2020
INSTICC
Valletta
Malta
[en] Ransomware ; Double Use Research in Cryptography ; Threat Intelligence and Counter-Intelligence
[en] Previous research has shown that developers rely on public platforms and repositories to produce functional but insecure code. We looked into the matter for ransomware, enquiring whether also ransomware engineers re-use the work of others and produce insecure code. By methodically reverse-engineering 128 malware executables, we have found that, out of 21 ransomware samples, 9 contain copy-paste code from public resources. Thanks to this finding, we managed to retrieve the decryption keys with which to nullify the ransomware attacks. From this fact, we recall critical cases of code disclosure in the recent history of ransomware and, arguing that ransomware are components in cyber-weapons, reflect on the dual-use nature of this research. We further discuss benefits and limits of using cyber-intelligence and counter-intelligence strategies that could be used against this threat.
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > Other
Researchers ; Professionals ; Students ; General public ; Others