Skip to main content
Top

2021 | OriginalPaper | Chapter

4. Ransomware Economics

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This chapter explores the underlying economics of cybercrime. The chapter begins by examining how cybercrime syndicates adapt to changing market conditions. This following section of the chapter explores how ransomware demonstrates the ability to monetise both valuable and innocuous data. The chapter then moves forward to discuss how Internet marketplaces have changed the dynamic for criminal activities and why some cybercriminals are shifting their focus to ransomware. It explores why cybercriminals have become more focused on holding files hostage for money than on unleashing stolen data to the black market (Parrish 2018). The final section of the chapter examines what are cryptocurrencies and what impact they have in ransomware attacks.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
Note: Data analytics tools may provide significant improvements in analysing known data sets. An example of this would be analysing internal company financial records for theft or fraudulent transactions. However, currently, these data analytics tools cannot be (or fully) applied to analyse transactions and exchanges between all known fiat currencies and cryptocurrencies. This indicates that attackers retain an advantage when utilising automated (scripted) transfers across multiple currencies and cryptocurrencies to launder illicit funds.
 
2
Note: This practice is not dissimilar to stolen property in the physical world. Due to the attention the property (coins) will draw from law enforcement, this increases the risk associated with the exchange. For accepting this burden, the exchange demands increased returns.
 
3
Note: A family member, friend or co-worker may have discussed a previous ransomware experience. This may have a significant influence on the victims perceived situation and its potential outcomes.
 
4
Note: Corporations should also understand their legal and regulatory constraints. In many Western countries, paying a ransom may not be permitted due to Know Your Customer (KYC) and anti-money laundering (AML) restrictions.
 
5
Note: The Internet is usually accessed through search engines. The darknet and Dark Web are the same distinction. The darknet is the network of computers that you can’t usually see/search, and the Dark Web is the system that allows you to interact with them.
 
6
Note: Cryptocurrencies are also generally not bound by regulations such as KYC and AML, which may cause delays in conventional finacial systems.
 
7
Note: To increase the probability of payment, some ransomware attackers have created even detailed instructions and inbuilt help desk-style features that assist victims purchase and make payment using cryptocurrencies.
 
8
Note: A user accessing the Internet from a public connection may be able to improve their level of online anonymity; however, they may inadvertently increase their probability of detection and identification through third-party systems such as CCTV. A user accessing the Internet from a private Internet connection that is routing through a VPN in combination with software applications such as TOR can generally expect their Internet connection and online activities to be anonymous. The obvious exception is a user’s system and networks whose hardware or software integrity has already been compromised (i.e., under surveillance by the state, a state agency or another actor).
 
9
Note: The Cryptolocker attacks infected over 500,000 machines between 2013 and 2014, using primitive spam messages to spread the virus and RSA encryption to lock the user’s files before demanding payment. The virus was ultimately brought down by a white hat campaign Tovar.
 
10
Note: The use of the term cryptojacking refers to the process of using malware to illegally steal CPU revolutions from victims’ devices to mine cryptocurrencies. (See Fuscaldo 2018).
 
Literature
go back to reference L. Ablon, M. Libicki, A. Golay, Projections and predictions for the black market, in Markets for Cybercrime Tools and Stolen Data Book Subtitle: Hackers’ Bazaar, (RAND Corporation, Santa Monica, 2014a)CrossRef L. Ablon, M. Libicki, A. Golay, Projections and predictions for the black market, in Markets for Cybercrime Tools and Stolen Data Book Subtitle: Hackers’ Bazaar, (RAND Corporation, Santa Monica, 2014a)CrossRef
go back to reference L. Ablon, M. Libicki, A. Golay, Characteristics of the black market, in Markets for Cybercrime Tools and Stolen Data Book Subtitle: Hackers’ Bazaar, (RAND Corporation, Santa Monica, 2014b)CrossRef L. Ablon, M. Libicki, A. Golay, Characteristics of the black market, in Markets for Cybercrime Tools and Stolen Data Book Subtitle: Hackers’ Bazaar, (RAND Corporation, Santa Monica, 2014b)CrossRef
go back to reference J. Angel, D. McCabe, The Ethics of Payments: Paper, Plastic, or Bitcoin? J. Bus. Ethics 132, 603–611 (2015)CrossRef J. Angel, D. McCabe, The Ethics of Payments: Paper, Plastic, or Bitcoin? J. Bus. Ethics 132, 603–611 (2015)CrossRef
go back to reference T. Bossert, Press briefing on the attribution of the WannaCry malware attack to North Korea, 19 Dec 2017 T. Bossert, Press briefing on the attribution of the WannaCry malware attack to North Korea, 19 Dec 2017
go back to reference D. Bryans, Bitcoin and money laundering: Mining for an effective solution. Indiana Law J. 89, 440–472 (2014) D. Bryans, Bitcoin and money laundering: Mining for an effective solution. Indiana Law J. 89, 440–472 (2014)
go back to reference A. Cohen, Cyber (in)security decision-making dynamics when moving out of your comfort zone. Cyber Def. Rev. (Army Cyber Institute) 2(1) (Winter), 45–60 (2017) A. Cohen, Cyber (in)security decision-making dynamics when moving out of your comfort zone. Cyber Def. Rev. (Army Cyber Institute) 2(1) (Winter), 45–60 (2017)
go back to reference M. Conti, A. Gangwal, S. Ru, On the economic significance of ransomware campaigns: A bitcoin transactions perspective. Comput. Secur. 79, 162–189 (2018)CrossRef M. Conti, A. Gangwal, S. Ru, On the economic significance of ransomware campaigns: A bitcoin transactions perspective. Comput. Secur. 79, 162–189 (2018)CrossRef
go back to reference European Central Bank, Virtual Currency Schemes (European Central Bank, Germany, 2012) European Central Bank, Virtual Currency Schemes (European Central Bank, Germany, 2012)
go back to reference EY, The relevance challenge: What retail banks must do to remain in the game, EY. (2016) EY, The relevance challenge: What retail banks must do to remain in the game, EY. (2016)
go back to reference S. Goldfeder, H. Kalodner, D. Reisman†, A. Narayanan, When the cookie meets the blockchain: Privacy risks of web payments via cryptocurrencies, Princeton University. (2017) S. Goldfeder, H. Kalodner, D. Reisman†, A. Narayanan, When the cookie meets the blockchain: Privacy risks of web payments via cryptocurrencies, Princeton University. (2017)
go back to reference G. Hileman, M. Rauchs, Global Cryptocurrency Benchmarking Study (University of Cambridge, 2017). Cambridge Centre for Alternative Finance, Cambridge, United Kingdom G. Hileman, M. Rauchs, Global Cryptocurrency Benchmarking Study (University of Cambridge, 2017). Cambridge Centre for Alternative Finance, Cambridge, United Kingdom
go back to reference D.Y. Huang, M.M. Aliapoulios, V.G. Li, L. Invernizzi, E. Bursztein, K. McRoberts, J. Levin, K. Levchenko, A.C. Snoeren, D. McCoy, Tracking ransomware end-to-end, IEEE symposium on security and privacy, 23 May 2018 [Video]. Available online: https://www.youtube.com/watch?v=H5bPmzsVLF8. Accessed 14 Mar 2019 D.Y. Huang, M.M. Aliapoulios, V.G. Li, L. Invernizzi, E. Bursztein, K. McRoberts, J. Levin, K. Levchenko, A.C. Snoeren, D. McCoy, Tracking ransomware end-to-end, IEEE symposium on security and privacy, 23 May 2018 [Video]. Available online: https://​www.​youtube.​com/​watch?​v=​H5bPmzsVLF8. Accessed 14 Mar 2019
go back to reference IBM, IBM X-Force threat intelligence index 2019. (2019) IBM, IBM X-Force threat intelligence index 2019. (2019)
go back to reference D. Irving, The digital underworld: What you need to know, RAND Review. (2016), 21 May 2018 D. Irving, The digital underworld: What you need to know, RAND Review. (2016), 21 May 2018
go back to reference A. Kesari, C. Hoofnagle, D. McCoy, Deterring cybercrime: Focus on intermediaries. Berkeley Technol. Law J. 32(3), 1131 (2017) A. Kesari, C. Hoofnagle, D. McCoy, Deterring cybercrime: Focus on intermediaries. Berkeley Technol. Law J. 32(3), 1131 (2017)
go back to reference A. Kharraz, W. Robertson, D. Balzarotti, L. Bilge, E. Kirda, Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks (Springer International Publishing, Cham, 2015) A. Kharraz, W. Robertson, D. Balzarotti, L. Bilge, E. Kirda, Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks (Springer International Publishing, Cham, 2015)
go back to reference M. Kien-Meng Ly, Coining Bitcoin’s “Legal-Bits”: Examining the regulatory framework for bitcoin and virtual currencies. Harvard J. Law Technol. 27(2) (Spring), 588–608 (2014) M. Kien-Meng Ly, Coining Bitcoin’s “Legal-Bits”: Examining the regulatory framework for bitcoin and virtual currencies. Harvard J. Law Technol. 27(2) (Spring), 588–608 (2014)
go back to reference N. Kshetri, Diffusion and effects of cyber-crime in developing economies. Third World Q.31(7), 1057–1079 (2010)CrossRef N. Kshetri, Diffusion and effects of cyber-crime in developing economies. Third World Q.31(7), 1057–1079 (2010)CrossRef
go back to reference M. Moser, Anonymity of bitcoin transactions: An analysis of mixing services, Monster Bitcoin Conference 17 Sept 2013, 2013 M. Moser, Anonymity of bitcoin transactions: An analysis of mixing services, Monster Bitcoin Conference 17 Sept 2013, 2013
go back to reference Ponemon Institute, The Rise of Ransomware. (2017) Ponemon Institute, The Rise of Ransomware. (2017)
go back to reference J. Robertson, A. Diab, E. Marin, E. Nunes, V. Paliath, J. Shakarian, P. Shakarian, Darknet mining and game theory for enhanced cyber threat intelligence. Cyber Def. Rev.1(2 (Fall)), 95–122 (2016) J. Robertson, A. Diab, E. Marin, E. Nunes, V. Paliath, J. Shakarian, P. Shakarian, Darknet mining and game theory for enhanced cyber threat intelligence. Cyber Def. Rev.1(2 (Fall)), 95–122 (2016)
go back to reference B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C (Wiley, New York, 1996)MATH B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C (Wiley, New York, 1996)MATH
go back to reference P. Singer, A. Friedman, Cybersecurity and Cyberwar: What Everyone Needs to Know (Oxford University Press, New York, 2014)CrossRef P. Singer, A. Friedman, Cybersecurity and Cyberwar: What Everyone Needs to Know (Oxford University Press, New York, 2014)CrossRef
go back to reference Symantec, Cryptojacking Skyrockets to the Top of the Attacker Toolkit, Signaling Massive Threat to Cyber and Personal Security, 21 Mar 2018 Symantec, Cryptojacking Skyrockets to the Top of the Attacker Toolkit, Signaling Massive Threat to Cyber and Personal Security, 21 Mar 2018
go back to reference S. Thakkar, Ransomware – Exploring the electronic form of extortion. Int. J. Sci. Res. Dev.2(10), 123–126 (2014) S. Thakkar, Ransomware – Exploring the electronic form of extortion. Int. J. Sci. Res. Dev.2(10), 123–126 (2014)
go back to reference Trustwave, The Value of Data: A Cheap Commodity or Priceless Asset? (Trustwave, United Kingdom, 2017) Trustwave, The Value of Data: A Cheap Commodity or Priceless Asset? (Trustwave, United Kingdom, 2017)
go back to reference J. Wolff, You’ll See This Message When It Is Too Late: The Legal and Economic Aftermath of Cybersecurity Breaches (The MIT Press, Cambridge, 2018)CrossRef J. Wolff, You’ll See This Message When It Is Too Late: The Legal and Economic Aftermath of Cybersecurity Breaches (The MIT Press, Cambridge, 2018)CrossRef
Metadata
Title
Ransomware Economics
Author
Matthew Ryan
Copyright Year
2021
DOI
https://doi.org/10.1007/978-3-030-66583-8_4

Premium Partner