2025 IEEE International Conference on Cyber Security and Resilience

Full Program

Summary:

Double extortion ransomware attacks have become mainstream since many organizations adopt more robust and resilient data backup strategies against conventional crypto-ransomware. This paper presents a detailed attack stage, tactics, procedures, and tools used in the double extortion ransomware attacks. We then present a novel detection method using low-level storage and memory behavioral features and network traffic features obtained from the thin hypervisor to establish a defense-in-depth strategy for when attackers compromise OS-level protection. We employed the lightweight \emph{Kitsune} Network Intrusion Detection System (NIDS)'s network feature to detect the data exfiltration phase in the double extortion ransomware attacks. The experimental results showed that the presented method improved by 0.166 in the macro F score of the data exfiltration phase detection rate. Lastly, we discuss the limitations of the presented methods and future work.

Author(s):

Manabu Hirano    
National Institute of Technology, Toyota College
Japan

Ryotaro Kobayashi    
Kogakuin University
Japan

 


Copyright © 2025 SUMMIT-TEC GROUP LTD