Summary
In this chapter, we researched ransomware in detail. We looked at popular cases and analyzed the code of one of the most influential ransomware attacks, Conti Leaks. We studied what best practices the authors of this leak adopted from malware development. We realized that in the modern landscape of cyber threats, ransomware occupies a very important, leading role and will remain one of the main threats for many years to come.
We also implemented a simple program that encrypts and decrypts a file with the AES algorithm using WINAPI. Of course, it cannot simulate full-fledged ransomware as it is found in the wild, but it can be a good starting point for your own threat and adversary simulation projects.
In this book, I tried to cover all areas of malware development. Like any program, the development of malware is also fascinating in its own way, complex in its own way, and, of course, still shrouded in mystery. The further and deeper you study this science, the more questions...