You are here: Home Contents V15 N1 V15N1_Daigle.html
Personal tools

Ransomware and Its Implications: A Report

 

 

Full text
View
Purchase

Source
Journal of Information Systems Security
Volume 15, Number 1 (2019)
Pages 6173
ISSN 1551-0123 (Print)
ISSN 1551-0808 (Online)
Authors
James Daigle — Duke University, USA
Publisher
Information Institute Publishing, Washington DC, USA

 

 

Abstract

The practice of demanding a ransom in exchange for the release of a person or an item has been part of the human experience dating at least as far back as Julius Caesar, who was captured by pirates who then demanded a payment of twenty talents for his release (Plutarch). Although Caesar was eventually released, not all ransom demands in history resulted in the safe return of the captured, or even the payment to the captors. With the advent of computers and the digitalization of data and assets, it was inevitable that ransom demands would find their way into the digital landscape in the form of ransomware. A portmanteau of the words ransom and malware, ransomware is a form of malware that, when it has been deployed, will encrypt data on a computer and demand a ransom for the key to unencrypt the data. The purpose of the paper is to explore ransomware and its global implications, not only on local and global economies, but also on industrial firms and what, if anything, can be done to protect ourselves from future attacks.

 

 

Keywords

Ransomware, Malware, Encrypt Data, Cryptocurrency, Protection from Attacks

 

 

References

AIDS Trojan or PC Cyborg Ransomware. Retrieved from URL: https://www.knowbe4.com/aids-trojan

Cooper, C. (May, 2018). WannaCry: Lessons Learned 1 Year Later. Retrieved from URL: https://www.symantec.com/blogs/feature-stories/wannacry-lessons-learned-1-year-later

Fazzini, K. (May, 2019). Microsoft’s security chief explains why the company is eliminating passwords. Retrieved from URL: https://www.cnbc.com/2019/05/01/microsoft-ciso-bret-arsenault-wants-to-eliminate-passwords.html

Fig. 1 Retrieved from URL: https://krebsonsecurity.com/wp-content/uploads/2012/08/reveton.png

Fig. 2 Retrieved from URL: https://www.statista.com/chart/9399/wannacry-cyber-attack-in-numbers/

Fig. 3 Retrieved from URL: https://www.symantec.com/blogs/threat-intelligence/wannacry-ransomware-attack

Fitz-Gerald, S. (July, 2013). Virus Coaxes Man to Turn Himself in for Child Pornography. Retrieved from URL: https://mashable.com/2013/07/28/virus-child-pornography/

Fromby, D., Durbha, S., and Beyah, R. (2017). Out of Control: Ransomware for Industrial Control Systems. Retrieved from URL: https://pdfs.semanticscholar.org/8768/b017f56ba79a77771ddf5cc1b8056ff13611.pdf

Fruhlinger, J. (October, 2017). Petya ransomware and NotPetya malware: What you need to know now. Retrieved from URL: https://www.csoonline.com/article/3233210/petya-ransomware-and-notpetya-malware-what-you-need-to-know-now.html

Greenberg, A. (August. 2018). The Untold Story of NotPetya, the Most Devastating Cyberattack in History. Retrieved from URL: https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/

Greenberg, A. (March, 2019). A Guide to LockerGoga, the Ransomware Crippling Industrial Firms. Retrieved from URL: https://www.wired.com/story/lockergoga-ransomware-crippling-industrial-firms/

Jones, S. and Bradshaw, T. (May, 2017). Global Alert to Prepare For Fresh Cyber Attacks. Retrieved from URL: https://www.ft.com/content/bb4dda38-389f-11e7-821a-6027b8a20f23

Khaitan, R. (May, 2017). The 10 Countries Suffering Most From WannaCry Malware Attack. Retrieved from URL: https://frontera.net/news/global-macro/1-the-10-countries-most-affected-by-the-wannacry-malware-attack/

McGuire, M, (April, 2018). The Web of Profit: Understanding the Growth of the Cybercrime Economy. [PDF file]. Retrieved from URL: https://www.bromium.com/free-report-complex-cybercrime-economy/

Mello Jr., J. (February, 2017). Security Awareness Training Explosion. Retrieved from URL: https://cybersecurityventures.com/security-awareness-training-report/

Morgan, S. (October, 2017). Cybercrime Damages $6 Trillion by 2021. Retrieved from URL: https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/

Nakashima, E. and Timberg, C. (May, 2017). NSA officials worried about the day its potent hacking tool would get loose. Then it did. Retrieved from URL: https://www.washingtonpost.com/business/technology/nsa-officials-worried-about-the-day-its-potent-hacking-tool-would-get-loose-then-it-did/2017/05/16/50670b16-3978-11e7-a058-ddbb23c75d82_story.html?utm_term=.d63e91736c33

Nash, K., Castellanos, S., and Janofsky, A. (June, 2018). One Year after NotPetya Cyberattack, Firms Wrestle with Recovery Costs. Retrieved from URL: https://www.wsj.com/articles/one-year-after-notpetya-companies-still-wrestle-with-financial-impacts-1530095906

Newman, L. H. (March, 2018). The Leaked NAS Spy Tool That Hacked the World. Retrieved from URL: https://www.wired.com/story/eternalblue-leaked-nsa-spy-tool-hacked-world/

Palmer, D. (October, 2018). This is how much the WannaCry ransomware attack cost the NHS. Retrieved from URL: https://www.zdnet.com/article/this-is-how-much-the-wannacry-ransomware-attack-cost-the-nhs/

Plutarch (1919). The Parallel Lives: The Life of Julius Caesar. Retrieved from URL: http://penelope.uchicago.edu/Thayer/E/Roman/Texts/Plutarch/Lives/Caesar*.html

Richardson, R. and North, M. (January, 2017). Ransomware: Evolution, Mitigation and Prevention. Retrieved from URL: https://digitalcommons.kennesaw.edu/cgi/viewcontent.cgi?article=5312&context=facpubs

Workman, M. (December, 2007). Gaining Access with Social Engineering: An Empirical Study of the Threat. Retrieved from URL: https://www.tandfonline.com/doi/full/10.1080/10658980701788165

Zetter, K. (January, 2015). A Cyberattack Has Caused Confirmed Physical Damage for the Second Time Ever. Retrieved from URL: https://www.wired.com/2015/01/german-steel-mill-hack-destruction/