Ransomware Attack Analysis in Cybersecurity

##plugins.themes.academic_pro.article.main##

Stefanus Eko Prasetyo
Heru Wijayanto Aripradono
Ricardo

Abstract

Ransomware attacks have emerged as a significant threat to computer security in the digital age. This research aims to analyze ransomware attacks within the context of cybersecurity, specifically focusing on the impact of such attacks on an organization's database infrastructure. The study involves simulating ransomware attacks using techniques commonly employed by attackers in real-world scenarios. It includes a comprehensive literature review, case observations of previous ransomware attacks, and system simulations to understand the nature of these attacks and their potential consequences. The research highlights the need for effective mitigation strategies to safeguard critical organizational infrastructure and provide insights into strengthening defenses against ransomware. The findings of this study are expected to contribute to the development of more effective and sustainable cybersecurity strategies to address the growing complexity of cyber threats and ensure the operational continuity of organizations.

Keywords:  Ransomware attacks, Cybersecurity, Database infrastructure

##plugins.themes.academic_pro.article.details##

How to Cite
Stefanus Eko Prasetyo, Heru Wijayanto Aripradono, & Ricardo. (2025). Ransomware Attack Analysis in Cybersecurity. Jurnal E-Komtek (Elektro-Komputer-Teknik), 9(1), 302-312. https://doi.org/10.37339/e-komtek.v9i1.2279

References

[1] B. Hartono, “Ransomware: Memahami Ancaman Keamanan Digital,” Bincang Sains dan Teknologi, vol. 2, no. 02, pp. 55–62, May 2023, doi: 10.56741/bst.v2i02.353.
[2] A. P. Novita et al., “CYBER SECURITY THREATS; ANALISIS DAN MITIGASI RESIKO RANSOMWARE DI INDONESIA,” Jurnal Simasi : Jurnal Ilmiah Sistem Informasi, vol. 3, no. 1, pp. 160–169, Jun. 2023, doi: 10.46306/sm.v3i1.
[3] Eka Febriantika Nur Afifah, Diny Widya Evriyanti Simatangkir, and Nafiza Salsabila Faliha, “Afifah et al. - 2025 - KEAMANAN SIBER DALAM PERBANKAN SERTA TANTANGAN DAN,” Multidisiplin Ilmu Akademik, vol. 2, pp. 1–10, Dec. 2024, doi: https://doi.org/10.61722/jmia.v2i1.3119.
[4] Aryanto Nur and Danang Abu Hafid, “Nur and Hafid - 2024 - PERANAN IT SECURITY DALAM MENGAMANKAN INFRASTRUKTU,” Jurnal Sains dan Teknologi, vol. 4, pp. 1–20, Oct. 2024, doi: https://doi.org/10.3785/kohesi.v4i10.6528.
[5] D. A. Saputra, S. Deris, and S. Tata, “Implementasi Sistem Deteksi Ransomware Menggunakan Deep Packet Inspection pada Layanan SMK Negeri 1 Palembang,” Indonesian Journal of Multidisciplinary on Social and Technology, vol. 1, no. 2, pp. 176–183, Jun. 2023, doi: 10.31004/ijmst.v1i2.142.
[6] U. Ubaidillah, T. Taryo, and A. Hindasyah, “Analisis dan Implementasi Honeypot Honeyd Sebagai Low Interaction Terhadap Serangan Distributed Denial Of Service (DDOS) dan Malware,” JTIM : Jurnal Teknologi Informasi dan Multimedia, vol. 5, no. 3, pp. 208–217, Oct. 2023, doi: 10.35746/jtim.v5i3.405.
[7] A. Afifah Rodhiyatun Nisa, Ananditto Daffa Wijayanto, Arya Prabudi Jaya Priana, and A. Setiawan, “Analisis Log Server untuk mendeteksi Serang DDoS pada Keamaan Jaringan di Website,” Journal of Internet and Software Engineering, vol. 1, no. 3, p. 17, Jun. 2024, doi: 10.47134/pjise.v1i3.2612.
[8] G. Ramadhan, “Ramadhan - 2023 - Perlidungan Hukum Bagi Korban Ransomware Wannacry,” Jurnal Kajian Kontemporer Hukum Dan Masyarakat, vol. 1, pp. 1–25, Jul. 2023, Accessed: Jan. 10, 2025. [Online]. Available: https://journal.forikami.com/index.php/dassollen/article/view/329
[9] Zahrani Fatni Hapsah and Muhammad Irwan Padli Nasution, “Hapsah and Nasution - 2024 - ANALISIS TINGKAT KEAMANAN DATA PERUSAHAAN YANG REN,” Jurnal Manajemen Dan Akuntansi, vol. 1, Jan. 2023, doi: https://doi.org/10.62017/wanargi.
[10] T. Kriminologi et al., “JICN: Jurnal Intelek dan Cendikiawan Nusantara Criminology Review of Extortion Crimes Using Viruses, Wannacry Ransomware as a Modern Crime,” Jurnal Intelek dan Cendikiawan Nusantara, vol. 1, May 2024, [Online]. Available: https://jicnusantara.com/index.php/jicn
[11] B. Brahara, D. Syamsuar, Y. Novaria Kunang, D. Jl Jenderal Ahmad Yani No, S. I. Ulu, and K. Palembang, “Analysis of Malware Dns Attack on the Network Using Domain Name System Indicators Analisis Serangan Dns Malware Di Jaringan Menggunakan Domain Name System Indikator (Studi Kasus Universitas Bina Darma),” Journal of Information Systems and Informatics, vol. 2, no. 1, 2020, [Online]. Available: http://journal-isi.org/index.php/isi
[12] Sarvina Sari Ahmad Fadil, “Strategi Pengembangan Sistem Keamanan Terpadu untuk Melindungi Sistem Operasi Windows dari Ancaman Cyber,” Router : Jurnal Teknik Informatika dan Terapan, vol. 2, no. 3, pp. 122–136, Jul. 2024, doi: 10.62951/router.v2i3.154.
[13] M. Hafeez, A. A. Lubis, and H. Y. Simatupang, “Kerjasama Indonesia-Inggris Dalam Pengembangan Keamanan Siber Nasional Melalui Cyber Diplomacy Indonesia-UK Cooperation in Developing National Cyber Security Through Cyber Diplomacy,” 2024. [Online]. Available: http://kti.potensi-utama.ac.id/index.php/globaperspective
[14] A. Dwi Madya, B. Djoko Haryanto, D. P. Ningsih, and F. Sinlae, “Keefektifan Metode Proteksi Data dalam Mengatasi Ancaman Cybersecurity,” INDOTECH Indonesian Journal of Education And Computer Science, vol. 1, no. 3, p. 2023.
[15] E. Dwi Hastri, “Cyber Espionage Sebagai Ancaman Terhadap Pertahanan Dan Keamanan Negara Indonesia,” Law & Justice Review Journal, vol. 1, no. 1, pp. 12–25, Jun. 2021, doi: 10.11594/lrjj.01.01.03.
[16] Sindy Ariyaningsih, A. Ari Andrianto, Adri Surya Kusuma, and Rina Arum Prastyanti, “Ariyaningsih et al. - 2023 - Korelasi Kejahatan Siber dengan Percepatan Digital,” Jurnal Ilmu Hukum, vol. 1, pp. 1–11, May 2023, doi: https://doi.org/10.56457/jjih.v1i1.38.