REvil (Also known as Sodinokibi) Ransomware (Travelex 2019) On New Year's Eve 2019, London-based foreign currency exchange Travelex was infiltrated by a ransomware group called Sodinokibi (aka REvil). The attackers made off with 5GB of customer data, including dates of birth, credit card information, and insurance details. Travelex paid 2.3 million dollars to the attackers. Malware Research Paper Assignment Overview: The Malicious Software Research Paper is a required writing assignment. · The paper must be at least 10 pages; not including the cover page, abstract, outline, and references. · The paper will be graded for technical content and APA Format. · A Kill Chain Analysis is required. · Research the topic approved by the professor in the Week 1 - Topic Submission: Malware Research Paper The paper will be posted in Canvas and emailed to the professor by the student on the assigned due date. Assignment Expectations: The expectations and requirements for the paper follow: Organize your paper and address he following items as possible: 1. Background Regarding the Malware a. General Description: When, where and how was the malware discovered b. Category of Malware: Virus, Worm, Trojan, Ransomware, etc. 2. Technical Detail Regarding the Malware a. National Vulnerability Database Information: Common Vulnerability and Exposure Listing, Common Attack Pattern Exploited, Aliases, Variants, etc. b. Technical Information: Vulnerabilities Exploited, Infection Mechanism, Applications, Operating Systems, Hardware Affected, Unique characteristics, etc. c. Payload Information: Trojan, Rootkit, Backdoor, Keylogger, etc. d. Propagation Mechanisms: Worm, Email, Botnet, Social Media, Supply Chain, etc. e. Obfuscation Techniques: Compression, encryption, polymorphism, anti-debugging, anti-disassembly f. General and specific detection techniques g. Remediation actions/procedures 3. Impacts of the Malware a. Describe the Political, Social and Economic effects b. Target of the attacks: Government, Users and Industry. c. Magnitude of attacks: Global, Nation State, Local d. Costs: Remediation, economic losses, etc. e. Action Taken: Political/Government, Legal proceedings, Charges, Prosecution 4. Malware Cybersecurity Attack Lifecycle Analysis and Mitigation Techniques a. Reconnaissance: Detect Potential Attack b. Weaponization: Deny Attacker Information c. Delivery: Disrupt Attackers Attempts d. Exploit: Degrade Effectiveness or Deflect Attack e. Control: Deceive Attacker f. Execute: Destroy Attackers Capability to Execute g. Maintain: Recover from Attack Please provide a graphical depiction of your Kill Chain Analysis.