REvil (Also known as Sodinokibi) Ransomware (Travelex 2019) On New Year’s Eve 20

REvil (Also known as Sodinokibi) Ransomware (Travelex 2019) On New Year’s Eve 2019, London-based foreign currency exchange Travelex was infiltrated by a ransomware group called Sodinokibi (aka REvil). The attackers made off with 5GB of customer data,
including dates of birth, credit card information, and insurance details. Travelex paid 2.3 million dollars to the attackers.
Research Paper
The Malicious Software
Research Paper is a required writing assignment.
The paper must be at least 10 pages; not including the cover
page, abstract, outline, and references.
The paper will be graded for technical content and APA Format.
A Kill Chain Analysis is required.
Research the topic approved by the professor in the Week 1 – Topic Submission: Malware Research Paper
The paper will be posted
in Canvas and emailed to the professor by the student on the assigned due date.
The expectations and
requirements for the paper follow:
Organize your paper and
address he following items as possible:
1. Background Regarding
the Malware
a. General Description: When, where and how was the malware discovered
b. Category of Malware: Virus, Worm, Trojan, Ransomware, etc.
2. Technical Detail Regarding the Malware
a. National Vulnerability Database Information: Common Vulnerability and
Exposure Listing, Common Attack Pattern Exploited, Aliases, Variants,
b. Technical Information: Vulnerabilities Exploited, Infection Mechanism,
Applications, Operating Systems, Hardware Affected, Unique characteristics, etc.
c. Payload Information: Trojan, Rootkit, Backdoor, Keylogger, etc.
d. Propagation Mechanisms: Worm, Email, Botnet, Social Media, Supply Chain,
e. Obfuscation Techniques: Compression, encryption, polymorphism,
anti-debugging, anti-disassembly
f. General and specific detection techniques
g. Remediation actions/procedures
3. Impacts of the Malware
a. Describe the Political, Social and Economic effects
b. Target of the attacks: Government, Users and Industry.
c. Magnitude of attacks: Global, Nation State, Local
d. Costs: Remediation, economic losses, etc.
e. Action Taken: Political/Government, Legal proceedings, Charges, Prosecution
4. Malware Cybersecurity
Attack Lifecycle Analysis and Mitigation Techniques
a. Reconnaissance: Detect Potential Attack
b. Weaponization: Deny Attacker Information
c. Delivery: Disrupt Attackers Attempts
d. Exploit: Degrade Effectiveness or Deflect Attack
e. Control: Deceive Attacker
f. Execute: Destroy Attackers Capability to Execute
g. Maintain: Recover from Attack
Please provide a
graphical depiction of your Kill Chain Analysis.

Post navigation

Leave a Reply

Your email address will not be published.