July 12, 2016 By Larry Loeb 2 min read

University of Florida and Villanova University security researchers have published a paper titled “CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data,” which focuses on a new way of stopping ransomware from completing its dastardly deeds. They also presented their findings at the IEEE International Conference on Distributed Computing Systems that took place on June 29, 2016, in Nara, Japan.

CryptoDrop Identifies Malicious Processes

Their solution is called CryptoDrop, and it acts as a detection system for encryption. Their project runs on Windows, which is a shift from similar initiatives such as Cryptostalker, which only ran on Linux.

Softpedia summarized the application by reporting that it “keeps an eye on the user’s file system for signs and operations specific to ransomware infections.” It will monitor for increases in encryption instances along with a few other red flags such as file type changes and a decrease in available entropy, the site noted.

Early Warning System

One of the researchers told Phys.org that the system is not intended to stop ransomware from the outset; rather, it recognizes when ransomware may be executing on a machine and it stops it from continuing. That way, a user may only lose a few documents as opposed to every file. It could also help them avoid paying a ransom for the stolen files.

The features and process seem reasonable: Watch for a spike in encryption operations and then shut it down. That will stop the ransomware from completing its efforts no matter how it breached the system. Unfortunately, there are some drawbacks to the technology.

Beware of False Positives

CryptoDrop can also cause false positives when any encryption happens for an extended period.

“CryptoDrop is unable to determine the intent of the changes it inspects,” the researchers explained in the paper. “For example, it cannot distinguish whether the user or ransomware is encrypting a set of documents.” Consequently, certain legitimate programs may trigger CryptoDrop alerts when used.

The researchers admitted that they would like to see the software move from the lab to the public. Whether it proves useful for the masses depends on the background encryption tasks that a user typically has — too many of them and you risk invoking the software. However, the average user or company employee who is not employing many of these programs could benefit greatly from a tool such as CryptoDrop.

More from

Autonomous security for cloud in AWS: Harnessing the power of AI for a secure future

3 min read - As the digital world evolves, businesses increasingly rely on cloud solutions to store data, run operations and manage applications. However, with this growth comes the challenge of ensuring that cloud environments remain secure and compliant with ever-changing regulations. This is where the idea of autonomous security for cloud (ASC) comes into play.Security and compliance aren't just technical buzzwords; they are crucial for businesses of all sizes. With data breaches and cyber threats on the rise, having systems that ensure your…

Adversarial advantage: Using nation-state threat analysis to strengthen U.S. cybersecurity

4 min read - Nation-state adversaries are changing their approach, pivoting from data destruction to prioritizing stealth and espionage. According to the Microsoft 2023 Digital Defense Report, "nation-state attackers are increasing their investments and launching more sophisticated cyberattacks to evade detection and achieve strategic priorities."These actors pose a critical threat to United States infrastructure and protected data, and compromising either resource could put citizens at risk.Thankfully, there's an upside to these malicious efforts: information. By analyzing nation-state tactics, government agencies and private enterprises are…

6 Principles of Operational Technology Cybersecurity released by joint NSA initiative

4 min read - Today’s critical infrastructure organizations rely on operational technology (OT) to help control and manage the systems and processes required to keep critical services to the public running. However, due to the highly integrated nature of OT deployments, cybersecurity has become a primary concern.On October 2, 2024, the NSA (National Security Agency) released a new CSI titled “Principles of Operational Technology Cybersecurity.” This new guide was created in collaboration with the Australian Signals Directorate’s Australian Cyber Security Centre (ASD SCSC) to…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today