Back to Search Start Over

Ransomware: Analysis and Evaluation of Live Forensic Techniques and the Impact on Linux based IoT Systems

Authors :
Korac, Salko
Maglaras, Leandros
Moradpoor, Naghmeh
Buchanan, Bill
Canberk, Berk
Publication Year :
2024

Abstract

Ransomware has been predominantly a threat to Windows systems. But, Linux systems became interesting for cybercriminals and this trend is expected to continue. This endangers IoT ecosystems, whereas many IoT systems are based on Linux (e.g. cloud infrastructure and gateways). This paper researches how currently employed forensic techniques can be applied to Linux ransomware and evaluates the maturity as well as the impact on the system. While Windows-based ransomware predominantly uses RSA and AES for key management, a variety of approaches was identified for Linux. Cybercriminals appear to be deliberately moving away from RSA and AES to make Live forensic investigations more difficult. Linux ransomware is developed for a predefined goal and does not exploit the full potential of damage. It appears in an early stage and is expected to reach a similar potential to Windows-based malware. The results generated provided an excellent basic understanding to discuss and assess implications on the IoT industry at an early stage of development.

Details

Database :
arXiv
Publication Type :
Report
Accession number :
edsarx.2403.17571
Document Type :
Working Paper