• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

勒索软件:分析对 Windows 活动目录域服务的影响。

Ransomware: Analysing the Impact on Windows Active Directory Domain Services.

机构信息

Blockpass ID Lab, School of Computing, Edinburgh Napier University, Edinburgh EH10 5DT, UK.

出版信息

Sensors (Basel). 2022 Jan 26;22(3):953. doi: 10.3390/s22030953.

DOI:10.3390/s22030953
PMID:35161699
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC8838225/
Abstract

Ransomware has become an increasingly popular type of malware across the past decade and continues to rise in popularity due to its high profitability. Organisations and enterprises have become prime targets for ransomware as they are more likely to succumb to ransom demands as part of operating expenses to counter the cost incurred from downtime. Despite the prevalence of ransomware as a threat towards organisations, there is very little information outlining how ransomware affects Windows Server environments, and particularly its proprietary domain services such as Active Directory. Hence, we aim to increase the cyber situational awareness of organisations and corporations that utilise these environments. Dynamic analysis was performed using three ransomware variants to uncover how crypto-ransomware affects Windows Server-specific services and processes. Our work outlines the practical investigation undertaken as WannaCry, TeslaCrypt, and Jigsaw were acquired and tested against several domain services. The findings showed that none of the three variants stopped the processes and decidedly left all domain services untouched. However, although the services remained operational, they became uniquely dysfunctional as ransomware encrypted the files pertaining to those services.

摘要

勒索软件在过去十年中已成为一种越来越流行的恶意软件,并且由于其高利润而继续流行。由于作为运营费用的一部分,组织和企业更有可能屈服于赎金要求,以抵消停机造成的损失,因此它们已成为勒索软件的主要目标。尽管勒索软件对组织构成了威胁,但几乎没有信息概述勒索软件如何影响 Windows Server 环境,特别是其专有的域服务,如 Active Directory。因此,我们旨在提高使用这些环境的组织和公司的网络安全态势感知能力。使用三种勒索软件变体进行了动态分析,以揭示加密勒索软件如何影响特定于 Windows Server 的服务和进程。我们的工作概述了对 WannaCry、TeslaCrypt 和 Jigsaw 进行的实际调查,并针对几个域服务对其进行了测试。研究结果表明,这三个变体都没有停止进程,并且明确地没有触及所有域服务。但是,尽管这些服务仍在运行,但由于勒索软件加密了与这些服务相关的文件,它们变得特别功能失调。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/85c4/8838225/b3b60e65a8a7/sensors-22-00953-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/85c4/8838225/cae980b83a38/sensors-22-00953-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/85c4/8838225/cd62c81cfaa1/sensors-22-00953-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/85c4/8838225/b7bf906bb407/sensors-22-00953-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/85c4/8838225/9ec2e88c6cf1/sensors-22-00953-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/85c4/8838225/2b5c255c42cc/sensors-22-00953-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/85c4/8838225/d72ff57e46da/sensors-22-00953-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/85c4/8838225/b3b60e65a8a7/sensors-22-00953-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/85c4/8838225/cae980b83a38/sensors-22-00953-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/85c4/8838225/cd62c81cfaa1/sensors-22-00953-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/85c4/8838225/b7bf906bb407/sensors-22-00953-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/85c4/8838225/9ec2e88c6cf1/sensors-22-00953-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/85c4/8838225/2b5c255c42cc/sensors-22-00953-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/85c4/8838225/d72ff57e46da/sensors-22-00953-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/85c4/8838225/b3b60e65a8a7/sensors-22-00953-g007.jpg

相似文献

1
Ransomware: Analysing the Impact on Windows Active Directory Domain Services.勒索软件:分析对 Windows 活动目录域服务的影响。
Sensors (Basel). 2022 Jan 26;22(3):953. doi: 10.3390/s22030953.
2
A Survey of Crypto Ransomware Attack Detection Methodologies: An Evolving Outlook.加密勒索软件攻击检测方法综述:不断发展的前景。
Sensors (Basel). 2022 Feb 25;22(5):1837. doi: 10.3390/s22051837.
3
Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification.用于勒索软件加密文件识别的熵计算方法比较
Entropy (Basel). 2022 Oct 21;24(10):1503. doi: 10.3390/e24101503.
4
On the classification of Microsoft-Windows ransomware using hardware profile.基于硬件配置文件对微软Windows勒索软件进行分类
PeerJ Comput Sci. 2021 Feb 2;7:e361. doi: 10.7717/peerj-cs.361. eCollection 2021.
5
Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review.人为因素对医疗机构网络安全的影响:系统综述。
Sensors (Basel). 2021 Jul 28;21(15):5119. doi: 10.3390/s21155119.
6
Effective Ransomware Detection Using Entropy Estimation of Files for Cloud Services.利用文件熵估计进行云服务中的有效勒索软件检测。
Sensors (Basel). 2023 Mar 10;23(6):3023. doi: 10.3390/s23063023.
7
An Effective Self-Configurable Ransomware Prevention Technique for IoMT.一种用于 IoMT 的有效自配置勒索软件预防技术。
Sensors (Basel). 2022 Nov 4;22(21):8516. doi: 10.3390/s22218516.
8
Dynamic Feature Dataset for Ransomware Detection Using Machine Learning Algorithms.使用机器学习算法的勒索软件检测动态特征数据集。
Sensors (Basel). 2023 Jan 17;23(3):1053. doi: 10.3390/s23031053.
9
A Method for Neutralizing Entropy Measurement-Based Ransomware Detection Technologies Using Encoding Algorithms.一种使用编码算法中和基于熵测量的勒索软件检测技术的方法。
Entropy (Basel). 2022 Feb 4;24(2):239. doi: 10.3390/e24020239.
10
Classification of ransomware using different types of neural networks.使用不同类型神经网络对勒索软件进行分类。
Sci Rep. 2022 Mar 19;12(1):4770. doi: 10.1038/s41598-022-08504-6.

本文引用的文献

1
A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric.使用 Hyperledger Fabric 的隐私保护医疗保健框架。
Sensors (Basel). 2020 Nov 18;20(22):6587. doi: 10.3390/s20226587.
2
A retrospective impact analysis of the WannaCry cyberattack on the NHS.对英国国民医疗服务体系(NHS)遭受的“想哭”勒索病毒网络攻击的回顾性影响分析。
NPJ Digit Med. 2019 Oct 2;2:98. doi: 10.1038/s41746-019-0161-6. eCollection 2019.