2023
DOI: 10.1365/s43439-023-00095-w
|View full text |Cite
|
Sign up to set email alerts
|

The evolution of ransomware attacks in light of recent cyber threats. How can geopolitical conflicts influence the cyber climate?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(6 citation statements)
references
References 32 publications
0
6
0
Order By: Relevance
“…Groups are also professionalizing, with some even providing "customer service" to aid ransom payment and data recovery [31,1]. The development of anonymous cryptocurrencies like Bitcoin fueled ransomware growth by enabling difficultto-trace extortion payments [44,34].…”
Section: Ransomware Evolutionmentioning
confidence: 99%
See 1 more Smart Citation
“…Groups are also professionalizing, with some even providing "customer service" to aid ransom payment and data recovery [31,1]. The development of anonymous cryptocurrencies like Bitcoin fueled ransomware growth by enabling difficultto-trace extortion payments [44,34].…”
Section: Ransomware Evolutionmentioning
confidence: 99%
“…Integrating such techniques with anomaly detection on document access patterns shows promise for early ransomware identification [62]. Nonetheless, generating sufficiently deceptive decoys across heterogenous enterprise data remains challenging [44]. Determining optimal decoy deployment strategies given infrastructure constraints also requires further study [15].…”
Section: Current Decoy File Techniquesmentioning
confidence: 99%
“…This shift has been indicative of a change in the goals and tactics employed by cybercriminals, emphasizing the growing significance of data as a tool for cyber extortion [6,32]. Research has shown that this evolution in ransomware tactics has led to an increase in the complexity and severity of attacks [1,2]. Studies conducted over the past few years have demonstrated a notable rise in incidents where sensitive data was not just held hostage but also threatened with public release or sale [33].…”
Section: Ransomware Evolutionmentioning
confidence: 99%
“…In the dynamic and constantly evolving landscape of cyber threats, ransomware has persistently emerged as a formidable challenge [1,2]. Historically, ransomware attacks were primarily centered around crypto-ransomware, wherein attackers encrypted victims' data and demanded a ransom for its release [3,4,5].…”
Section: Introductionmentioning
confidence: 99%
“…Key Cyber Attacks in the Banking Industries These attacks target the banks' data, networks, systems, and reputation, and can cause significant losses, fines, and customer dissatisfaction (Abou El Houda, 2024, Naveenan, andSuresh, 2023). Cybercriminals constantly develop new ways to infiltrate and exploit the banks' security defenses, using advanced techniques and tools (Gulyás, and Kiss, 2023 Boticiu, and Sergi, 2023). The rising regulatory and compliance requirements, such as the General Data Protection Regulation (GDPR) (Bertolaccini et al, 2023, Lukic, Miller, andSkiera, 2023), the Payment Services Directive 2 (PSD2), the Basel III Accord (Alvi, and Williamson, 2023), and the Cybersecurity Maturity Model Certification (CMMC) (Buzdugan, and Căpățână, 2023, Acosta, and Jahankhani, 2023, Okunade et al, 2023.…”
Section: Introductionmentioning
confidence: 99%