2019
DOI: 10.2139/ssrn.3351416
|View full text |Cite
|
Sign up to set email alerts
|

Economics of Ransomware Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 38 publications
0
6
0
Order By: Relevance
“…This may create a remit for policymakers to highlight more strongly the social responsibilities around cyber-behaviour. It is also important to consider the incentives for software developers to sell low-cost protection against ransomware [42]. Competing interests.…”
Section: Resultsmentioning
confidence: 99%
“…This may create a remit for policymakers to highlight more strongly the social responsibilities around cyber-behaviour. It is also important to consider the incentives for software developers to sell low-cost protection against ransomware [42]. Competing interests.…”
Section: Resultsmentioning
confidence: 99%
“…In other words, victims must pay for the decryption key, or else they will face significant data loss and business disruption. 1 Interestingly, victims, although unwilling to admit so publicly, often end up paying substantial amounts as ransom. For example, Travelex, a well-known financial firm, has paid $2.3 million following a breach in the late December of 2019 [12].…”
Section: Introductionmentioning
confidence: 99%
“…Such worries for a much larger loss have created a surreal scenario where city councils, state governments, and even police departments are lining up after a breach to pay the ransom necessary to get their stuff back [8]. The lesson 1 Of course, there is no guarantee that the attacker would honor its word upon receiving the ransom payment. As a result, a victim firm may question in the first place the value of acceding to the ransom demand.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…If the encryption is done in a technically sound way then the files are only recoverable by paying the ransom. Crypto-ransomware provides, therefore, a viable business model for criminals and some variants of ransomware have a 'good reputation' for returning files to victims (if the ransom is paid) [8][9][10]. In another, older variant, of ransomware victims are held to ransom for the release of sensitive information [11].…”
Section: Introductionmentioning
confidence: 99%