Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon free Evolution of ransomware

Cybercrime has long since transformed from a world of Maverick attackers to a criminal business. Ransomware is a malware that renders a victim's computer or data unusable and is increasingly being used by criminals to generate revenue through extortion. This study contributes to the authors’ knowledge by exploring the transition from the early-day scams, to extortion implemented by current ransomware. They examine the pathway from the first clumsy ransomware attempts to the present day sophisticated ransomware attack campaigns. This Crypto-warfare now accounts for estimated damages of $1 billion. Considering the fact that many Internet users appear to be unaware of ransomware and do little to protect themselves, they argue that this low-impact extortion, using highly automated methods, has proven very rewarding for the criminals. As criminals have been early adopters (or abusers) of Internet technology, they expect that ransomware will continue to evolve beyond the capability of present day defence solutions.

References

    1. 1)
      • 22. Free ransomware decryption tools’, AVG. Available at https://www.avg.com/en-gb/ransomware-decryption-tools, accessed 2 February 2018.
    2. 2)
      • 12. Hern, A.: ‘New nasty ransomware encourages victims to attack other computers’, The Guardian (12 December 2016). Available at https://www.theguardian.com/technology/2016/dec/12/new-ransomware-victims-popcorn-time-malware, 2016, accessed 15 Mar 2017.
    3. 3)
      • 17. Bitcoin’. Available at https://bitcoin.org/en/choose-your-wallet, accessed February 2018.
    4. 4)
      • 7. Reid, F., Harrigan, M.: ‘An analysis of anonymity in the Bitcoin system’, in ltshuler, Y., Elovici, Y., Cremers, A., et al (Eds.): ‘Security and privacy in social networks’ (Springer, New York, NY, 2013), pp. 197223.
    5. 5)
      • 1. Fitzpatrick, D., Griffin, D.: ‘Cyber-extortion losses skyrocket, says FBI’, CNNMoney, (15 April 2016). Available at http://money.cnn.com/2016/04/15/technology/ransomware-cyber-security/, 2016, accessed 15 April 2017.
    6. 6)
      • 9. FBI: ‘Criminals continue to defraud and extort funds from victims using CryptoWall ransomware schemes’, (23 June 2015), Alert Number: I-062315-PSA. Available at https://www.ic3.gov/media/2015/150623.aspx, 2015, accessed 21 June 2017.
    7. 7)
      • 18. How to pay with bitcoin guide’, Coinify. Available at https://support.coinify.com/Knowledgebase/Article/View/165/5/how-to-pay-with-bitcoin-guide, 30 Nov 2016, accessed 2 February 2018.
    8. 8)
      • 10. The secret behind CryptoWall's success’, Imperva. Available at www.imperva.com/docs/IMPERVA_HII_CryptoWall_report.pdf, 2016, accessed 21 June 2017.
    9. 9)
      • 16. Actual ransom’, @collinskeith, (May 2017). Available at https://twitter.com/actual_ransom?lang=en, May 2017, accessed 2 February 2018.
    10. 10)
      • 15. Ward, M.: ‘Cryptolocker victims to get files back for free’, BBC News, (6 August 2014). Available at http://www.bbc.co.uk/news/technology-28661463, 2014, accessed 21 June 2017.
    11. 11)
      • 5. Sato, Y., Nakamura, Y., Inamura, H., et al: ‘A proposal of malicious URLs detection based on features generated by exploit kits’, 2016.
    12. 12)
      • 11. Turkel, D.: ‘Victims paid more than $24 million to ransomware criminals in 2015 — and that's just the beginning’, Business Insider (7 April 2016). Available at http://uk.businessinsider.com/doj-and-dhs-ransomware-attacks-government-2016-4, 2016, accessed 21 June 2017.
    13. 13)
      • 3. McAfee Labs: ‘Understanding ransomware and strategies to defeat it (white paper)’. Available at https://www.mcafee.com/us/resources/white-papers/wp-understanding-ransomware-strategies-defeat.pdf, 2017, accessed 17 May 2017.
    14. 14)
      • 21. RedMosquito. Available at http://www.rm-ransomwarerecovery.com/?gclid=CjwKCAiAtdDTBRArEiwAPT4y-1v-5y_TzrPU0XRP788GO4IaxdcK2-AdSEemOeS98e_8HHV5U8E69BoCv2cQAvD_BwE, accessed 2 February 2018.
    15. 15)
      • 13. McDonald, G., O'Gorman, G.: ‘Ransomware: a growing menace’. Available at http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/ransomware-a-growing-menace.pdf, 2016, accessed 17 May 2017.
    16. 16)
      • 8. Hernandez-Castro, J., Cartwright, E., Stepanova, A.: ‘Economic analysis of ransomware’, (21 March 2017). Available at https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2937641, 2017, accessed 21 June 2017.
    17. 17)
      • 6. Milena, D.: ‘Open-source ransomware based on hidden tear and EDA2 on the loose’, (25 August 2016). Available at https://sensorstechforum.com/open-source-ransomware-based-hidden-tear-eda2-loose/, 2016, accessed 17 May 2017.
    18. 18)
      • 2. Tuttle, H.: ‘Ransomware attacks pose growing threat. Risk management’, Risk Manage., New York, 2016, 63, (4), p. 4. Available at http://search.proquest.com/docview/1792354247?pq-origsite=gscholar/, 2016, accessed 17 May 2017.
    19. 19)
      • 4. Richardson, R., North, M.: ‘Ransomware: evolution, mitigation and prevention’, Int. Manage. Rev., 2017, 13, (1), p. 10.
    20. 20)
      • 19. Shade ransomware decryption too’, McAfee. Available at https://www.mcafee.com/hk/downloads/free-tools/shadedecrypt.aspx, accessed 2 February 2018.
    21. 21)
      • 20. NO MORE RANSOM!’. Available at https://www.nomoreransom.org/en/index.html, accessed 2 February 2018.
    22. 22)
      • 14. Jarvis, K.: ‘Cryptolocker ransomware’, SecureWorks, (18 December 2013). Available at https://www.secureworks.com/research/cryptolocker-ransomware, Dec 2013, accessed 21 June 2017.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-net.2017.0207
Loading

Related content

content/journals/10.1049/iet-net.2017.0207
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address