Data Aware Defense (DaD): Towards a Generic and Practical Ransomware Countermeasure

  • Conference paper
  • First Online:
Secure IT Systems (NordSec 2017)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10674))

Included in the following conference series:

Abstract

We present the Malware - O - Matic analysis platform and the Data Aware Defense ransomware countermeasure based on real time data gathering with as little impact as possible on system performance. Our solution monitors (and blocks if necessary) file system activity of all userland threads with new indicators of compromise. We successfully detect 99.37% of our 798 active ransomware samples with at most 70 MB lost per sample’s thread in 90% of cases, or less than 7 MB in 70% of cases. By a careful analysis of the few false negatives we show that some ransomware authors are specifically trying to hide ongoing encryption. We used free (as in free beer) de facto industry standard benchmarks to evaluate the impact of our solution and enable fair comparisons. In all but the most demanding tests the impact is marginal.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (France)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 42.79
Price includes VAT (France)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 52.74
Price includes VAT (France)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    Usually the encryption keys are themselves encrypted with an asymmetric cryptosystem, the ransom must be paid in order to get the corresponding private key.

  2. 2.

    They use the Kullback-Liebler divergence instead but do not introduce an implementation.

  3. 3.

    We restricted ourselves to free (as in free beer) softwares used to assess performance of personal computers to ensure pertinence and affordable reproducibility.

  4. 4.

    Windows 7 SP1 6.1.7601, Intel Xeon W3550, NVIDIA Quadro FX 1800, 4 Gb DDR3, Intel SSD 120 Go SATA III.

  5. 5.

    http://hdd.userbenchmark.com/WD-Black-6TB-2015/Rating/3519.

  6. 6.

    We solicited the authors and got a negative answer from [5], and no answer from [23] as of submission.

  7. 7.

    PayBreak did, might be samples mislabeling.

References

  1. Bisson, D.: C&C servers? too risky! Android botnet goes with Twitter instead. https://www.blee**computer.com/news/security/candc-servers-too-risky-android-botnet-goes-with-twitter-instead/

  2. Bonferroni, C.E.: Teoria statistica delle classi e calcolo delle probabilita. Libreria internazionale Seeber (1936)

    Google Scholar 

  3. Cimpanu, C.: Microsoft announces controlled folder access to fend off crypto-ransomware. https://www.blee**computer.com/news/microsoft/microsoft-announces-controlled-folder-access-to-fend-off-crypto-ransomware/

  4. Clonezilla: The free and open source software for disk imaging and cloning. http://clonezilla.org/

  5. Continella, A., Guagnelli, A., Zingaro, G., De Pasquale, G., Barenghi, A., Zanero, S., Maggi, F.: ShieldFS: a self-healing, ransomware-aware filesystem. In: Proceedings of the 32nd Annual Conference on Computer Security Applications, pp. 336–347. ACM (2016)

    Google Scholar 

  6. Craig: Differentiate encryption from compression using math, June 2013. http://www.devttys0.com/2013/06/differentiate-encryption-from-compression-using-math/

  7. Crystal Dew World: CrystalDiskMark is a disk benchmark software. http://crystalmark.info/software/CrystalDiskMark/index-e.html

  8. Corpora, D.: Producing the digital body. http://digitalcorpora.org/

  9. Geekbench: New benchmarks, redesigned interface. http://geekbench.com/

  10. Octave, G.N.U.: Scientific programming language. https://octave.sourceforge.io/octave/function/chi2inv.html

  11. Haschek, C.: How to defend your website with ZIP bombs. https://blog.haschek.at/2017/how-to-defend-your-website-with-zip-bombs.html

  12. Ivanov, A., Sinitsyn, F.: The first cryptor to exploit telegram. https://securelist.com/blog/research/76558/the-first-cryptor-to-exploit-telegram/

  13. Kharraz, A., Arshad, S., Mulliner, C., Robertson, W., Kirda, E.: UNVEIL: a large-scale, automated approach to detecting ransomware. In: Proceedings of the 25th USENIX Security Symposium, Austin Texas, pp. 757–772. Usenix (2016)

    Google Scholar 

  14. Kharraz, A., Robertson, W., Balzarotti, D., Bilge, L., Kirda, E.: Cutting the Gordian knot: a look under the hood of ransomware attacks. In: Almgren, M., Gulisano, V., Maggi, F. (eds.) DIMVA 2015. LNCS, vol. 9148, pp. 3–24. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-20550-2_1

    Chapter  Google Scholar 

  15. Kolodenker, E., Koch, W., Stringhini, G., Egele, M.: PayBreak: defense against cryptographic ransomware. In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, pp. 599–611. ACM (2017)

    Google Scholar 

  16. Malekal: Malware repository. http://malwaredb.malekal.com/

  17. Mbol, F., Robert, J.-M., Sadighian, A.: An efficient approach to detect TorrentLocker ransomware in computer systems. In: Foresti, S., Persiano, G. (eds.) CANS 2016. LNCS, vol. 10052, pp. 532–541. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-48965-0_32

    Chapter  Google Scholar 

  18. Microsoft: File system minifilter drivers. https://msdn.microsoft.com/en-us/windows/hardware/drivers/ifs/file-system-minifilter-drivers

  19. Microsoft: Windows performance toolkit. https://msdn.microsoft.com/en-us/windows/hardware/commercialize/test/wpt/index

  20. Palisse, A., Le Bouder, H., Lanet, J.-L., Le Guernic, C., Legay, A.: Ransomware and the legacy crypto API. In: Cuppens, F., Cuppens, N., Lanet, J.-L., Legay, A. (eds.) CRiSIS 2016. LNCS, vol. 10158, pp. 11–28. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-54876-0_2

    Chapter  Google Scholar 

  21. PCMark 8: The complete benchmark for Windows 8.1, Windows 8 and Windows 7. https://www.futuremark.com/benchmarks/pcmark

  22. PolarToffee: Found a sample of the AES-NI ransomware, April 2017. https://twitter.com/PolarToffee

  23. Scaife, N., Carter, H., Traynor, P., Butler, K.R.: Cryptolock (and drop it): stop** ransomware attacks on user data. In: 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS), pp. 303–312. IEEE (2016)

    Google Scholar 

  24. Sebastián, M., Rivera, R., Kotzias, P., Caballero, J.: AVclass: a tool for massive malware labeling. In: Monrose, F., Dacier, M., Blanc, G., Garcia-Alfaro, J. (eds.) RAID 2016. LNCS, vol. 9854, pp. 230–253. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-45719-2_11

    Chapter  Google Scholar 

  25. SonicWall: Annual threat report. Technical report, SonicWall (2017). https://www.sonicwall.com/docs/2017-sonicwall-annual-threat-report-white-paper-24934.pdf

  26. The Talos Group: MBR filter driver. https://github.com/vrtadmin/MBRFilter

  27. Micro, T.: CryLocker uses Imgur as C&C. http://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/ransomware-recap-sept-2-2016-crylocker-uses-imgur-as-c-c

  28. Micro, T.: Cerber starts evading machine learning. http://blog.trendmicro.com/trendlabs-security-intelligence/cerber-starts-evading-machine-learning/

  29. Viper: Binary management and analysis framework. http://viper.li/

  30. VirusShare: Malware repository. https://virusshare.com/

  31. Wardle, P.: Towards generic ransomware detection. https://objective-see.com/blog/blog_0x0F.html

  32. Young, A., Yung, M.: Cryptovirology: extortion-based security threats and countermeasures. In: 1996 IEEE Symposium on Security and Privacy, Proceedings, pp. 129–140. IEEE (1996)

    Google Scholar 

  33. Young, A.L., Yung, M.M.: An implementation of cryptoviral extortion using Microsoft’s crypto API. CiteSeerX (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aurélien Palisse .

Editor information

Editors and Affiliations

Appendices

Appendix 1: Ransomware Collection

Table 3. An overview of the active ransomware families used in the experiments (i.e., 87.98%). More details at: http://people.rennes.inria.fr/Aurelien.Palisse/DaD.html.

Appendix 2: Empirical Tests

Table 4. Shannon entropy values with 10K files for each file type.
Table 5. Chi-Square (\(\chi ^2\)) values with 10K files for each file type.

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Palisse, A., Durand, A., Le Bouder, H., Le Guernic, C., Lanet, JL. (2017). Data Aware Defense (DaD): Towards a Generic and Practical Ransomware Countermeasure. In: Lipmaa, H., Mitrokotsa, A., Matulevičius, R. (eds) Secure IT Systems. NordSec 2017. Lecture Notes in Computer Science(), vol 10674. Springer, Cham. https://doi.org/10.1007/978-3-319-70290-2_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-70290-2_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-70289-6

  • Online ISBN: 978-3-319-70290-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation