Abstract:
Crypto ransomware is one of the most widespread malware cyberattacks worldwide. it is typically spread using phishing emails and compromised websites, where crypto-ransomware is downloaded stealthily after luring users to click on malicious links. Additionally, attackers may take advantage of available vulnerabilities in software installed on the victim's device or use a zero-day vulnerability in the operating system. Crypto-ransomware employs encryption techniques against users' data and resources, rendering them inaccessible and demanding a cryptocurrency ransom for decryption. Crypto-ransomware attacks have witnessed massive growth within the past few years, resulting in massive financial loss across the globe. Different detection and prevention techniques have been proposed to overcome crypto-ransomware attacks, and many tools have been implemented. In this work the authors present an overview of the most recently used techniques and tools, highlighting different employed strategies that address crypto-ransomware attacks in the different stages of the attack chain.