Simulating a Ransomware Attack for Security Evaluation
Publication Type
Conference Paper
Authors

This paper presents a comprehensive simulation of 
a ransomware attack designed for educational and awareness 
purposes. The simulation follows the structure of a real-life 
cyberattack and is guided by the cyber kill chain framework. It 
replicates critical stages including delivery—via USB-based and 
email spoofing methods—exploitation, persistence, command-
and-control communication, and impact through file encryption 
and psychological pressure tactics. While some initial stages 
such as reconnaissance are simplified, the simulation provides a 
realistic and resolvable representation of ransomware behavior in 
mid-to-late attack phases. By evaluating various delivery methods 
and obfuscation techniques, this study enhances understanding of 
ransomware threats and supports the development of defensive 
strategies in a controlled environment. The findings highlight 
significant gaps in current detection mechanisms and emphasize 
the importance of proactive cybersecurity education.

Conference
Conference Title
ICAMAC2025: 2nd International Conference on Artificial Intelligence, Metaverse, and Cybersecurity
Conference Country
United Arab Emirates
Conference Date
Oct. 17, 2025 - Oct. 18, 2025
Conference Sponsor
-
Additional Info
Conference Website