Social engineering as an attack vector for ransomware

Pablo L. Gallegos-Segovia, Paúl E. Vintimilla-Tapia, Jack F. Bravo-Torres, Iván F. Yuquilima-Albarado, Víctor M. Larios-Rosillo, Juan D. Jara-Saltos

Research output: Contribution to conferencePaper

16 Scopus citations

Abstract

© 2017 IEEE. Constant ransomware attacks achieve to evade multiple security perimeters, because its strategy is based on the exploitation of users—the weakest link in the security chain—getting high levels of effectiveness. In this paper, an in-depth analysis of the anatomy of the ransomware is develop, and how they combine technology with manipulation, through social engineering, to meet their goals and compromise thousands of computers. Finally, simulations of the phases that it follows are carried out, leaving the necessary guidelines to evaluate the security of the information, and thus, generate policies that minimize the risks of loss of information.
Original languageEnglish (US)
Pages1-6
Number of pages6
DOIs
StatePublished - 19 Dec 2017
Event2017 CHILEAN Conference on Electrical, Electronics Engineering, Information and Communication Technologies, CHILECON 2017 - Proceedings - Pucon, Chile
Duration: 18 Oct 201720 Oct 2017

Conference

Conference2017 CHILEAN Conference on Electrical, Electronics Engineering, Information and Communication Technologies, CHILECON 2017 - Proceedings
Abbreviated titleCHILECON 2017
Country/TerritoryChile
CityPucon
Period18/10/1720/10/17

Fingerprint

Dive into the research topics of 'Social engineering as an attack vector for ransomware'. Together they form a unique fingerprint.

Cite this