RATTATA: Ransomware Analysis via Automated Impact Assessment of Philippine Organizations
Keywords:
Attacks, Cybersecurity, Organizations, Philippines, Ransomware, MalwareAbstract
Contemporarily, Ransomware is a type of malicious software – Malware- that persists and evolves accordingly to organizational countermeasures. It aims to block user access to a system and its data, typically for monetary gain. Two major methods of doing so are the blatant blocking of a system’s use and the encryption of these data. This poses a significant threat to organizations, causing major financial losses and disclosure of confidential or sensitive data to unauthorized individuals, as attackers often exfiltrate the data in the process. In the Philippines, the general overview of the cybersecurity landscape has been explored and evaluated. It is observed that the country is particularly lacking in its investment in the field, with a misconception of its insignificance, despite its looming and ever-growing threats. This has caused major data leakages and compromised services in recent years. Despite these existing evaluations, there remains an opportunity to delve deeper into this for a richer understanding. This journal intends to provide the initial groundworks for this, by assessing Ransomware experiences and impacts in Philippine organizations of different sectors and correlating such with existing knowledge. This is particularly conducted by thoroughly evaluating the qualitative data and extracting its key features for its automated categorization.
Downloads
References
D. J. Dacanay, J. Fajutagana, M. S. Quinto and F. Parayno, "A Comparative Study of the Philippines in a Global Cybersecurity Context and its Implications on Local Cybersecurity Practices," May 2024. [Online]. Available: ResearchGate.
C. D. Qmorog and R. P. Medina, "Internet Security Awareness of Filipinos: A Survey Paper," November 2020. [Online]. Available: ResearchGate.
C. Beaman, A. Barkworth, T. D. Akande, S. Hakak and M. K. Khan, "Ransomware: Recent Advances, Analysis, Challenges, and Future Research Directions," December 2021. [Online]. Available: PubMed.
Secure Connections, "Cybersecurity in the Philippines: Global Context and Local Challenges," March 2022. [Online]. Available: The Asia Foundation.
J. G. Hernandez, L. A. Gonzalez and P. D. Teodoro, "R-Locker: Thwarting Ransomware Action through a Honeyfile-based Approach," March 2020. [Online]. Available: ResearchGate.
S. Razaulla, C. Fachka, C. Markarian, A. Gawanmeh, W. Mansoor, B. Fung and C. Assi, "The Age of Ransomware: A Survey on the Evolution, Taxonomy, and Research Directions," April 2023. [Online]. Available: IEEE Xplore.
P. G. Segovia, J. F. Torres, V. L. Rosillo, P. V. Tapia, I. Y. Albarado and J. J. Saltos, "Social Engineering as an Attack Vector for Ransomware," October 2017. [Online]. Available: IEEE Xplore.
H. M. Puat and N. A. Rahman, "Ransomware as a Service and Public Awareness," November 2020. [Online]. Available: PalArch.
M. Cen, F. Jiang, X. Qin, Q. Jiang and R. Doss, "Ransomware Early Detection: A Survey," December 2023. [Online]. Available: ScienceDirect.
M. Yu and S. M. Smith, "Grounded Theory: A Guide for a New Generation of Researchers," July 2021. [Online]. Available: ResearchGate.
P. Bajpai and R. Enbody, "Know Thy Ransomware Response: A Detailed Framework for Devising Effective Ransomware Response Strategies," October 2023. [Online]. Available: ACM Digital Library.
P. Cichonski, T. Miller, T. Grance and K. Scarfone, "Computer Security Incident Handling Guide," vol. 800, no. 61, August 2012.
D. S. Wall, "The Transnational Cybercrime Extortion Landscape and the Pandemic: Changes in Ransomware Offender Tactics, Attack Scalability, and the Organisation of Offending," August 2021. [Online]. Available: Elsevier.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Aaron Lensmer Abdon, Michael Gabriel Del Rosario, Jerome Gutierrez, Keinaz Domingo, Patricia Nicole Ople, Sophia Ysabelle Fallarme, Sofia Mariel Mitchell

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.