Ransomware reloaded: Re-examining its trend, research and mitigation in the era of data exfiltration

T McIntosh, T Susnjak, T Liu, D Xu, P Watters… - ACM Computing …, 2024 - dl.acm.org
Ransomware has grown to be a dominant cybersecurity threat by exfiltrating, encrypting, or
destroying valuable user data and causing numerous disruptions to victims. The severity of …

Applying chatgpt-powered game theory in ransomware negotiations

T Zhu, X Li, W Zhang - Authorea Preprints, 2023 - techrxiv.org
This study looks into the application of game theory and ChatGPT in the context of
ransomware negotiations, providing a novel perspective on cyber threat management …

[HTML][HTML] Deception in double extortion ransomware attacks: An analysis of profitability and credibility

T Meurs, E Cartwright, A Cartwright, M Junger… - Computers & …, 2024 - Elsevier
Ransomware attacks have evolved with criminals using double extortion schemes, where
they signal data exfiltration to inflate ransom demands. This development is further …

Preventive portfolio against data-selling ransomware—A game theory of encryption and deception

Z Li, Q Liao - Computers & Security, 2022 - Elsevier
Ransomware has risen to be among the top cyber threats in recent years. There is an
alarming trend of ransomware stealing data in addition to locking files. Compared to …

Ransomware economics: a two-step approach to model ransom paid

T Meurs, E Cartwright, A Cartwright… - … on Electronic Crime …, 2023 - ieeexplore.ieee.org
Ransomware poses a significant and pressing challenge in today's society. Mitigation efforts
aim to reduce the profitability of ransomware attacks. Nevertheless, limited research has …

A Review of the Evaluation of Ransomware: Human Error or Technical Failure?

S Sakib, MAK Raiaan, NM Fahad… - … on Information and …, 2023 - ieeexplore.ieee.org
The advancement of technology has led to a significant rise in cybercriminal activities, with
ransomware emerging as a prominent threat to both individuals and businesses …

The economics of ransomware attacks on integrated supply chain networks

A Cartwright, E Cartwright - Digital Threats: Research and Practice, 2023 - dl.acm.org
We explore the economics of ransomware on production supply chains. Integrated supply
chains result in a mutual-dependence between firms that can be exploited by cyber …

Game theoretic modelling of a ransom and extortion attack on ethereum validators

A Bhudia, A Cartwright, E Cartwright… - Proceedings of the 18th …, 2023 - dl.acm.org
Consensus algorithms facilitate agreement on and resolution of blockchain functions, such
as smart contracts and transactions. Ethereum uses a Proof-of-Stake (PoS) consensus …

Game theory of data-selling ransomware

Z Li, Q Liao - Journal of Cyber Security and Mobility, 2021 - journals.riverpublishers.com
We are experiencing the worst years of ransomware attacks with continuing news reports on
high-profile ransomware attacks on organizations such as hospitals, schools, government …

Multistage game theoretical approach for ransomware attack and defense

C Zhang, F Luo, G Ranzi - IEEE Transactions on Services …, 2022 - ieeexplore.ieee.org
Ransomware attacks have become a critical threat in human society. This article proposes a
multistage game for the ransomware attacker and the target. The game consists of four …