Ransomware and Its Implications: A Report
Full text | |||
Source | Journal of Information Systems Security Volume 15, Number 1 (2019)
Pages 61–73
ISSN 1551-0123 (Print)ISSN 1551-0808 (Online) |
||
Authors | James Daigle — Duke University, USA | ||
Publisher | Information Institute Publishing, Washington DC, USA |
Abstract
The practice of demanding a ransom in exchange for the release of a person or an item has been part of the human experience dating at least as far back as Julius Caesar, who was captured by pirates who then demanded a payment of twenty talents for his release (Plutarch). Although Caesar was eventually released, not all ransom demands in history resulted in the safe return of the captured, or even the payment to the captors. With the advent of computers and the digitalization of data and assets, it was inevitable that ransom demands would find their way into the digital landscape in the form of ransomware. A portmanteau of the words ransom and malware, ransomware is a form of malware that, when it has been deployed, will encrypt data on a computer and demand a ransom for the key to unencrypt the data. The purpose of the paper is to explore ransomware and its global implications, not only on local and global economies, but also on industrial firms and what, if anything, can be done to protect ourselves from future attacks.
Keywords
Ransomware, Malware, Encrypt Data, Cryptocurrency, Protection from Attacks
References
AIDS Trojan or PC Cyborg Ransomware. Retrieved from URL: https://www.knowbe4.com/aids-trojan
Cooper, C. (May, 2018). WannaCry: Lessons Learned 1 Year Later. Retrieved from URL: https://www.symantec.com/blogs/feature-stories/wannacry-lessons-learned-1-year-later
Fazzini, K. (May, 2019). Microsoft’s security chief explains why the company is eliminating passwords. Retrieved from URL: https://www.cnbc.com/2019/05/01/microsoft-ciso-bret-arsenault-wants-to-eliminate-passwords.html
Fig. 1 Retrieved from URL: https://krebsonsecurity.com/wp-content/uploads/2012/08/reveton.png
Fig. 2 Retrieved from URL: https://www.statista.com/chart/9399/wannacry-cyber-attack-in-numbers/
Fig. 3 Retrieved from URL: https://www.symantec.com/blogs/threat-intelligence/wannacry-ransomware-attack
Fitz-Gerald, S. (July, 2013). Virus Coaxes Man to Turn Himself in for Child Pornography. Retrieved from URL: https://mashable.com/2013/07/28/virus-child-pornography/
Fromby, D., Durbha, S., and Beyah, R. (2017). Out of Control: Ransomware for Industrial Control Systems. Retrieved from URL: https://pdfs.semanticscholar.org/8768/b017f56ba79a77771ddf5cc1b8056ff13611.pdf
Fruhlinger, J. (October, 2017). Petya ransomware and NotPetya malware: What you need to know now. Retrieved from URL: https://www.csoonline.com/article/3233210/petya-ransomware-and-notpetya-malware-what-you-need-to-know-now.html
Greenberg, A. (August. 2018). The Untold Story of NotPetya, the Most Devastating Cyberattack in History. Retrieved from URL: https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/
Greenberg, A. (March, 2019). A Guide to LockerGoga, the Ransomware Crippling Industrial Firms. Retrieved from URL: https://www.wired.com/story/lockergoga-ransomware-crippling-industrial-firms/
Jones, S. and Bradshaw, T. (May, 2017). Global Alert to Prepare For Fresh Cyber Attacks. Retrieved from URL: https://www.ft.com/content/bb4dda38-389f-11e7-821a-6027b8a20f23
Khaitan, R. (May, 2017). The 10 Countries Suffering Most From WannaCry Malware Attack. Retrieved from URL: https://frontera.net/news/global-macro/1-the-10-countries-most-affected-by-the-wannacry-malware-attack/
McGuire, M, (April, 2018). The Web of Profit: Understanding the Growth of the Cybercrime Economy. [PDF file]. Retrieved from URL: https://www.bromium.com/free-report-complex-cybercrime-economy/
Mello Jr., J. (February, 2017). Security Awareness Training Explosion. Retrieved from URL: https://cybersecurityventures.com/security-awareness-training-report/
Morgan, S. (October, 2017). Cybercrime Damages $6 Trillion by 2021. Retrieved from URL: https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/
Nakashima, E. and Timberg, C. (May, 2017). NSA officials worried about the day its potent hacking tool would get loose. Then it did. Retrieved from URL: https://www.washingtonpost.com/business/technology/nsa-officials-worried-about-the-day-its-potent-hacking-tool-would-get-loose-then-it-did/2017/05/16/50670b16-3978-11e7-a058-ddbb23c75d82_story.html?utm_term=.d63e91736c33
Nash, K., Castellanos, S., and Janofsky, A. (June, 2018). One Year after NotPetya Cyberattack, Firms Wrestle with Recovery Costs. Retrieved from URL: https://www.wsj.com/articles/one-year-after-notpetya-companies-still-wrestle-with-financial-impacts-1530095906
Newman, L. H. (March, 2018). The Leaked NAS Spy Tool That Hacked the World. Retrieved from URL: https://www.wired.com/story/eternalblue-leaked-nsa-spy-tool-hacked-world/
Palmer, D. (October, 2018). This is how much the WannaCry ransomware attack cost the NHS. Retrieved from URL: https://www.zdnet.com/article/this-is-how-much-the-wannacry-ransomware-attack-cost-the-nhs/
Plutarch (1919). The Parallel Lives: The Life of Julius Caesar. Retrieved from URL: http://penelope.uchicago.edu/Thayer/E/Roman/Texts/Plutarch/Lives/Caesar*.html
Richardson, R. and North, M. (January, 2017). Ransomware: Evolution, Mitigation and Prevention. Retrieved from URL: https://digitalcommons.kennesaw.edu/cgi/viewcontent.cgi?article=5312&context=facpubs
Workman, M. (December, 2007). Gaining Access with Social Engineering: An Empirical Study of the Threat. Retrieved from URL: https://www.tandfonline.com/doi/full/10.1080/10658980701788165
Zetter, K. (January, 2015). A Cyberattack Has Caused Confirmed Physical Damage for the Second Time Ever. Retrieved from URL: https://www.wired.com/2015/01/german-steel-mill-hack-destruction/