Skip to main content
Erschienen in:
Buchtitelbild

2021 | OriginalPaper | Buchkapitel

1. Introduction

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The first known incidence of ransomware is the AIDS Trojan developed and distributed by Dr. Joseph Popp in 1989 (Mungo and Clough 1992). Popp was a medical researcher who distributed 20,000 floppy disks to fellow researchers who attended the 1989 World Health Organization’s (WHO) conference on AIDS. Popp claimed that his program could analyse an individual’s risk of acquiring AIDS; however, the disk he distributed to his colleagues also contained a malware program (Trojan) that activated after the victim’s computer was rebooted 90 times. Once the malware was initiated, all the user’s files and directories were encrypted in the computer system’s root directory. Once the encryption process was completed, the malware displayed a message asking the user to pay $378 (USD) for renewing a license which could recover the lost files and directories. The request for payment asked the user to mail the ransom payment in the form of a cashier’s cheque to a post office box in Panama. The trouble and time delay in paying the ransom and receiving the decryption key ultimately limited the profitability of the attack (Solomon et al. 2000). It is unclear how many people fell victim to the attack; however, it didn’t take long for the Federal Bureau of Investigation (FBI) to attribute the attack to Popp, and he was arrested in February 1990 and extradited from London to the United States to face trial.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Note: The AIDS Trojan was named by its developer Dr. Joseph Popp, who attempted to defend his unscrupulous actions by arguing the ransom payments were to be used to undertake further medical research into AIDS. See also Anonymous (1998).
 
2
Note: At the hearing, Popp was ruled mentally unfit to stand trial and remained free until his death in 2007. See Simone (2015).
 
3
Note: Within the United States, the Westpoint Military Academy and the Naval Postgraduate School are examples of institutions that produce advanced cyber security research. However, by default this advanced research would be classified information, and therefore not shared with the broader cyber security research community or public.
 
4
Note: Even other employees within these organisations may not be aware of the existence of internal research on ransomware attacks. Due to the potential impact to the organisation’s reputation and stock prices, research data associated with previous ransomware attacks will most likely be limited to a need-to-know basis.
 
5
Note: From an attacker’s perspective, the gains from the emergence of these technologies are not mutually exclusive to only ransomware as these technologies are also enablers for many other forms of cyberattack.
 
6
Note: It can be argued that public key encryption is not a necessary technology for ransomware attacks because there are conceiveable ways of using shared key encryption to implement a ransomware attack, even if it would be more difficult and cumbersome than with public key encryption.
 
7
Note: In 1983, David Chaum described digital money in a scientific paper. A key point that distiguisehs digital money from credit-card payments is anonymity. Users receive the digital currency from their bank, but then it is made anonymous. This allows the bank to see who has exchanged how much money but not what it is used for.
 
Literatur
Zurück zum Zitat L. Ablon, M. Libicki, A. Golay, Projections and predictions for the black market, in Markets for Cybercrime Tools and Stolen Data Book Subtitle: Hackers’ Bazaar, (RAND Corporation, Santa Monica, 2014a)CrossRef L. Ablon, M. Libicki, A. Golay, Projections and predictions for the black market, in Markets for Cybercrime Tools and Stolen Data Book Subtitle: Hackers’ Bazaar, (RAND Corporation, Santa Monica, 2014a)CrossRef
Zurück zum Zitat L. Ablon, M. Libicki, A. Golay, Characteristics of the black market, in Markets for Cybercrime Tools and Stolen Data Book Subtitle: Hackers’ Bazaar, (RAND Corporation, Santa Monica, 2014b) L. Ablon, M. Libicki, A. Golay, Characteristics of the black market, in Markets for Cybercrime Tools and Stolen Data Book Subtitle: Hackers’ Bazaar, (RAND Corporation, Santa Monica, 2014b)
Zurück zum Zitat M. Albrecht, Ransomware timeline 2010-2017 (2017) M. Albrecht, Ransomware timeline 2010-2017 (2017)
Zurück zum Zitat G. Austin, J. Slay, Australia’s response to advanced technology threats: An agenda for the next government, Australian Centre for Cyber Security, Discussion paper no. 3 (2016) G. Austin, J. Slay, Australia’s response to advanced technology threats: An agenda for the next government, Australian Centre for Cyber Security, Discussion paper no. 3 (2016)
Zurück zum Zitat M. Bernier, J. Treurniet, Understanding cyber operations in a Canadian strategic context: More than C4ISR, More than Cno, Conference on Cyber Conflict. Tallinn, Estonia, 2010: CCD COE Publications M. Bernier, J. Treurniet, Understanding cyber operations in a Canadian strategic context: More than C4ISR, More than Cno, Conference on Cyber Conflict. Tallinn, Estonia, 2010: CCD COE Publications
Zurück zum Zitat T. Bossert, Press briefing on the attribution of the WannaCry malware attack to North Korea, 19 Dec 2017 T. Bossert, Press briefing on the attribution of the WannaCry malware attack to North Korea, 19 Dec 2017
Zurück zum Zitat A.W. Coburn, J. Daffron, A. Smith, J. Bordeau, É. Leverett, S. Sweeney, T. Harvey, Cyber Risk Outlook 2018 (Centre for Risk Management Studies, University of Cambridge, in collaboration with Risk Management Solutions, Inc., 2018) A.W. Coburn, J. Daffron, A. Smith, J. Bordeau, É. Leverett, S. Sweeney, T. Harvey, Cyber Risk Outlook 2018 (Centre for Risk Management Studies, University of Cambridge, in collaboration with Risk Management Solutions, Inc., 2018)
Zurück zum Zitat EastWest Institute, Mobilizing for international action, Second worldwide cybersecurity summit. London, 1–2 June 2011 2011 EastWest Institute, 4–5 EastWest Institute, Mobilizing for international action, Second worldwide cybersecurity summit. London, 1–2 June 2011 2011 EastWest Institute, 4–5
Zurück zum Zitat I. Ehrlich, Crime, punishment, and the market for offenses? J. Econ. Perspect. 10(1), 43–67 (1996)CrossRef I. Ehrlich, Crime, punishment, and the market for offenses? J. Econ. Perspect. 10(1), 43–67 (1996)CrossRef
Zurück zum Zitat A. Gazet, Comparative analysis of various ransomware virii. J. Comput. Virol. 6(1), 77–90 (2010)CrossRef A. Gazet, Comparative analysis of various ransomware virii. J. Comput. Virol. 6(1), 77–90 (2010)CrossRef
Zurück zum Zitat JASON, Science of cyber-security. (2010) JASON, Science of cyber-security. (2010)
Zurück zum Zitat L. Kello, The quest for cyber theory, in The Virtual Weapon and International Order, (Yale University Press, 2017) L. Kello, The quest for cyber theory, in The Virtual Weapon and International Order, (Yale University Press, 2017)
Zurück zum Zitat A. Knott, Towards fundamental science of cyber security, in Network Science and Cybersecurity, (Springer, 2014), pp. 1–13 A. Knott, Towards fundamental science of cyber security, in Network Science and Cybersecurity, (Springer, 2014), pp. 1–13
Zurück zum Zitat E. Lucas, Cyberphobia: Identity, Trust, Security and the Internet (Bloomsbury Publishing, London, 2015) E. Lucas, Cyberphobia: Identity, Trust, Security and the Internet (Bloomsbury Publishing, London, 2015)
Zurück zum Zitat S. McQuade, Technology-enabled Crime, Policing and Security. J. Technol. Stud. 32(1/2), 32–42 (2006) S. McQuade, Technology-enabled Crime, Policing and Security. J. Technol. Stud. 32(1/2), 32–42 (2006)
Zurück zum Zitat J. Mittelman, R. Johnston, The globalization of organized crime, the courtesan state, and the corruption of civil society. Glob. Gov. 5(1), 103–126 (1999)CrossRef J. Mittelman, R. Johnston, The globalization of organized crime, the courtesan state, and the corruption of civil society. Glob. Gov. 5(1), 103–126 (1999)CrossRef
Zurück zum Zitat T. Moore, E. Kenneally, M. Collett, P. Thapa, Valuing cybersecurity research datasets, Workshop on the Economics of Information Security (WEIS). Cambridge, MA, June 3–4, 2019, The University of Tulsa, International Computer Science Institute, Berkeley Office of Science & Technology, and Department of Homeland Security T. Moore, E. Kenneally, M. Collett, P. Thapa, Valuing cybersecurity research datasets, Workshop on the Economics of Information Security (WEIS). Cambridge, MA, June 3–4, 2019, The University of Tulsa, International Computer Science Institute, Berkeley Office of Science & Technology, and Department of Homeland Security
Zurück zum Zitat P. Mungo, B. Clough, Approaching Zero: The Extraordinary Underworld of Hackers, Phreakers, Virus Writers, and Keyboard Criminals (Random House, New York, 1992) P. Mungo, B. Clough, Approaching Zero: The Extraordinary Underworld of Hackers, Phreakers, Virus Writers, and Keyboard Criminals (Random House, New York, 1992)
Zurück zum Zitat H. Orman, Evil Offspring – Ransomware and crypto technology. IEEE Internet Comput.20, 5 (2016) H. Orman, Evil Offspring – Ransomware and crypto technology. IEEE Internet Comput.20, 5 (2016)
Zurück zum Zitat P. Singer, A. Friedman, Cybersecurity and Cyberwar: What Everyone Needs to Know (Oxford University Press, New York, 2014)CrossRef P. Singer, A. Friedman, Cybersecurity and Cyberwar: What Everyone Needs to Know (Oxford University Press, New York, 2014)CrossRef
Zurück zum Zitat A. Taylor, NotPetya Malware Attributed. (16 Feb 2018) A. Taylor, NotPetya Malware Attributed. (16 Feb 2018)
Zurück zum Zitat G. Treverton, M. Wollman, E. Wilke, D. Lai, The threat will continue to morph, in Moving Toward the Future of Policing, (RAND Corporation, 2011), pp. 89–106 G. Treverton, M. Wollman, E. Wilke, D. Lai, The threat will continue to morph, in Moving Toward the Future of Policing, (RAND Corporation, 2011), pp. 89–106
Zurück zum Zitat S. von Solms, D. Naccache, On blind signatures and perfect crimes. Comput. Secur.11(6), 581–583 (1992)CrossRef S. von Solms, D. Naccache, On blind signatures and perfect crimes. Comput. Secur.11(6), 581–583 (1992)CrossRef
Zurück zum Zitat J. Wolff, You’ll See This Message When It Is Too Late: The Legal and Economic Aftermath of Cybersecurity Breaches (The MIT Press, Cambridge, 2018)CrossRef J. Wolff, You’ll See This Message When It Is Too Late: The Legal and Economic Aftermath of Cybersecurity Breaches (The MIT Press, Cambridge, 2018)CrossRef
Zurück zum Zitat A. Young, M. Yung, Cryptovirology: Extortion-based security threats and countermeasures, in Proceedings 1996 IEEE Symposium on Security and Privacy. 6–8 May 1996 A. Young, M. Yung, Cryptovirology: Extortion-based security threats and countermeasures, in Proceedings 1996 IEEE Symposium on Security and Privacy. 6–8 May 1996
Zurück zum Zitat A. Young, M. Yung, Malicious Cryptography: Exposing Cryptovirology (Wiley Publishing, Indianapolis, 2004) A. Young, M. Yung, Malicious Cryptography: Exposing Cryptovirology (Wiley Publishing, Indianapolis, 2004)
Metadaten
Titel
Introduction
verfasst von
Matthew Ryan
Copyright-Jahr
2021
DOI
https://doi.org/10.1007/978-3-030-66583-8_1

Premium Partner