Author(s):
Conference Name
SCITEPRESS - Science and Technology Publications
Abstract
Previous research has shown that developers rely on public platforms and repositories to produce functional but insecure code. We looked into the matter for ransomware, enquiring whether also ransomware engineers re-use the work of others and produce insecure code.
Concluding remarks
By methodically reverse-engineering 128 malware executables, we have found that, out of 21 ransomware samples, 9 contain copy-paste code from public resources. Thanks to this finding, we managed to retrieve the decryption keys with which to nullify the ransomware attacks. From this fact, we recall critical cases of code disclosure in the recent history of ransomware and, arguing that ransomware are components in cyber-weapons, reflect on the dual-use nature of this research. We further discuss benefits and limits of using cyber-intelligence and counter-intelligence strategies that could be used against this threat.
Reference details
DOI
10.5220/0009000505850592
Resource type
Conference Proceedings
Year of Conference
2020
Publication Area
Dual-use cybersecurity
Date Published
2020
How to cite this reference:
Genç, Z., & Lenzini, G. (2020). Dual-Use Research In Ransomware Attacks: A Discussion on Ransomware Defence Intelligence. https://doi.org/10.5220/0009000505850592 (Original work published 2020)