INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VO`LUME 10, ISSUE 02, FEBRUARY 2021 ISSN 2277-8616 271 IJSTR©2021 www.ijstr.org Survey On Ransomware Evolution, Prevention, And Mitigation Mousab Hamad, Derar Eleyan. Abstract: Ransomware transformed into a form of criminal business. malware that takes over a victim's machine or data unusable. it is booming so fast all the world, it is a dangerous threat to usersand corporates‘ data file. Ransomware encrypts files on an infected computer and holds the key to decrypt the files until the victim pays a ransom (this is why it is called ransomware). Ransomware is causing losses financially from hundreds of millions of dollars annually. Every year passes we observe a new version of this destructive malware. And the new versions have new technologies to bypass the defenders. In this paper, we present a brief history of ransomware, the best methods to prevent the infection, how to detect it, and how to recover from this infection. This monster has estimated financial damage of $1 billion. The fact that many Internet users appear to have no awareness of ransomware and do how to awake and protect themselves, they think that with a highly automated tool like it they won‘t be targeted because they are normal users in Cyberspace. Index Terms: Ransomware, Malware, Automated Virus, Cyberspace ———————————————————— I. INTRODUCTION Ransomware, in other words, called crypto infection, has gotten critical consideration among internet scientists over the most recent couple of years. offenders utilize this malware to take individuals' private data. The payment or request can be digital money or requests to buy from assigned stores [1]. Ransomware is built and developed to disrupt access to the data or even access to the machine itself. The attackers then exploit the victim for the recovery of the equipment or data. Ransomware displays a screen containing a message about the terms of the ransom (ransom note), and in our days. Some ransomware would go to the extent of displaying on this screen some Child pornography and highlight the threatening to the victim's life. These scary techniques are the facilitation that criminals use to make paying felt easier. [2] As known as Internet play like a double-edged sword and here the Internet and new technologies like cloud computing and digital currency such as Bitcoin and Ethereum provide the best ground for offenders especially those who are developing ransomware. The amount of money the perpetrator receives as ransom is between $300 and $700 for people and between $10,000 and $17,000 for companies [4]. According to the FBI's Cyber Crime Complaint Center, between April 2014 and June 2015, ransomware attacks caused an estimated $ 18 million in damage [5]. In many situations, the only way to retrieve the files which are is to pay the ransom even though it is not recommended. In general, [6] mentioned two types of ransomware: Locky and Crypto, Crypto ransomware uses encryption technologies to lock chosen files from user access; this is much more difficult to overcome and the harm can be permanent. Crypto ransomware is also the most common form used by cybercriminals. On the other hand, Locky ransomware locks the whole device from the user's entry point, but it is normally easy to resolve. The third form of ransomware called scareware. The third type was not considered as a type of ransomware but some researchers did count it as one. The scareware attempts to persuade the victim to buy antivirus which if it is not a fake one. It should remove the virus. All of these are included in the display message. The antivirus is non-functional malware too [7,8]. Some security mechanisms can detect ransomware based on its Activities such as File System Activities, Registry Activities, Control Management Unit, Network Operation, and Lock mechanism [9,10]. Options of heal from ransomware might not always be present because some encryption is too much Hard to crack without a decryption key even though Defense companies are consistent Develop and release an anti-ransomware program and Tools for decryption in response to the threat [10,12]. Detecting the malware early in the event of an attack is one of the important things to make the damages less than the target of the offender for both Businesses and individuals [9,10]. If anyone determined to pay the ransom. That does not inflect him from contacting the FBI. In all situations, the FBI supports all victims to report their incidents especially if it is ransomware. In 2019, the IC3 received 2,047 complaints identified as ransomware with adjusted losses of over $8.9 million [37]. In this paper, the evolution of ransomware attacks stated to enterprises and individuals is stated. and recommend Prevention strategies and describing the best practices. We elaborate on the financial impact of the different categories of ransomware information systems and recommend mitigation strategies. The remainder of the paper is structured as follows: Section II introduces the literature review. Section III consists of detection and prevention techniques of the ransomware. Section IV discusses the ransomware lifecycle. Section V discusses the mitigation strategies and best recovering methods. The Related works are discussed in Section VI. and the conclusion is described in Section VII. II. LITERATURE REVIEW 1. Ransomware Evolution Ransomware isn't a new idea, the first ransomware that showed up in 1989 was named the PC CYBORG (Helps) Trojan. Joseph Popp evolved the first ransomware program in 1989, with the name of the bad diseases in that time. ‗AIDS‘ (PC Cyborg) which was treated and considered as a Trojan. Floppy discs were used to spread this Trojan. Once the floppy disc is inserted into the machine, the AIDS program encrypted ________________________ Mousab Hamad, Applied Computing Department, Faculty of Applied Science, Palestine Technical University Kadoorie, Tulkarem, Palestine. Derar Eleyan, Associate Professor in Information Systems, Applied Computing Department, Faculty of Applied Science, Palestine Technical University Kadoorie, Tulkarem, Palestine