Conti Ransomware Development Evaluation

S. Alzahrani, Yang Xiao, S. Asiri
{"title":"Conti Ransomware Development Evaluation","authors":"S. Alzahrani, Yang Xiao, S. Asiri","doi":"10.1145/3564746.3587004","DOIUrl":null,"url":null,"abstract":"The world has been witnessing an increase in malware attacks in recent years. Specifically, ransomware attacks, where attackers lock or encrypt victims' files and ask for a ransom to unlock or decrypt the files and restore the device's state. Ransomware dark market has become very profitable, and its cybercriminals make millions of dollars in revenue. One of the most active ransomware attacks in recent years is Conti ransomware. It works under a ransomware-as-a-service (RaaS) business model. The first beta version of Conti ransomware was seen in October 2019, and its first known attack was reported in July 2020 and has been operational since then. In this paper, we track the development of Conti ransomware, categorize its samples, and compare their features to understand its success and efficiency, which made it top the charts in terms of revenue and the number of attacks. First, we collect many Conti ransomware samples from its beta version to the latest known release. Then we analyze them in an isolated environment and categorize them into seven versions based on their release date and feature similarities. Finally, for each version, we list its features and the previous version's addition, deletion, and/or modification with our reasoning for these changes. This research shows that although Conti started as a beta version with minimal ransomware features, it gradually added new features or modified existing ones through the adoption of continuous development and delivery. For example, API hashing, API run-time loading, and efficient encryption mechanism area are all features added over time and have yet to exist in their earlier releases.","PeriodicalId":322431,"journal":{"name":"Proceedings of the 2023 ACM Southeast Conference","volume":"99 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2023 ACM Southeast Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3564746.3587004","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The world has been witnessing an increase in malware attacks in recent years. Specifically, ransomware attacks, where attackers lock or encrypt victims' files and ask for a ransom to unlock or decrypt the files and restore the device's state. Ransomware dark market has become very profitable, and its cybercriminals make millions of dollars in revenue. One of the most active ransomware attacks in recent years is Conti ransomware. It works under a ransomware-as-a-service (RaaS) business model. The first beta version of Conti ransomware was seen in October 2019, and its first known attack was reported in July 2020 and has been operational since then. In this paper, we track the development of Conti ransomware, categorize its samples, and compare their features to understand its success and efficiency, which made it top the charts in terms of revenue and the number of attacks. First, we collect many Conti ransomware samples from its beta version to the latest known release. Then we analyze them in an isolated environment and categorize them into seven versions based on their release date and feature similarities. Finally, for each version, we list its features and the previous version's addition, deletion, and/or modification with our reasoning for these changes. This research shows that although Conti started as a beta version with minimal ransomware features, it gradually added new features or modified existing ones through the adoption of continuous development and delivery. For example, API hashing, API run-time loading, and efficient encryption mechanism area are all features added over time and have yet to exist in their earlier releases.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Conti勒索软件开发评估
近年来,世界目睹了恶意软件攻击的增加。特别是勒索软件攻击,攻击者锁定或加密受害者的文件,并要求赎金解锁或解密文件并恢复设备状态。勒索软件黑市已经变得非常有利可图,其网络罪犯赚取了数百万美元的收入。近年来最活跃的勒索软件攻击之一是Conti勒索软件。它在勒索软件即服务(RaaS)的商业模式下工作。康提勒索软件的第一个测试版是在2019年10月发现的,其第一次已知攻击是在2020年7月报道的,从那时起就一直在运行。在本文中,我们跟踪了Conti勒索软件的发展,对其样本进行了分类,并比较了它们的特征,以了解它的成功和效率,这使得它在收入和攻击次数方面名列前茅。首先,我们收集了许多康提勒索软件样本,从它的测试版到最新的已知版本。然后,我们在一个孤立的环境中对它们进行分析,并根据它们的发布日期和功能相似性将它们分为七个版本。最后,对于每个版本,我们列出了它的功能和前一个版本的添加、删除和/或修改,以及我们对这些更改的原因。这项研究表明,尽管Conti最初是一个测试版,具有最少的勒索软件功能,但它通过采用持续的开发和交付逐渐添加新功能或修改现有功能。例如,API散列、API运行时加载和高效加密机制领域都是随着时间的推移而添加的功能,在早期版本中尚未存在。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Scan Stack: A Search-based Concurrent Stack for GPU Mobility-based Optimal Relay Node Selection for IoT-oriented SDWSN Conti Ransomware Development Evaluation News Consumption Among CS Majors: Habits, Perceptions, and Challenges Analysis of ECDSA's Computational Impact on IoT Network Performance
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1