Publication Cover
EDPACS
The EDP Audit, Control, and Security Newsletter
Volume 69, 2024 - Issue 2
129
Views
0
CrossRef citations to date
0
Altmetric
Research Article

A SURVEY OF THE CURRENT AND EMERGING RANSOMWARE THREAT LANDSCAPE

REFERENCES

  • Aaron Zimba, M. C. (2019). On the economic impact of crypto-ransomware attacks: The state of the art on enterprise systems. European Journal for Security Research, 4(1), 3–31. https://doi.org/10.1007/s41125-019-00039-8
  • Al-Hawawreh, M., Alazab, M., Ferrag, M. A., & Hossain, M. S. (2023). Securing the industrial internet of things against ransomware attacks: A comprehensive analysis of the emerging threat landscape and detection mechanisms. Journal of Network and Computer Applications, 223, 103809. https://doi.org/10.1016/j.jnca.2023.103809
  • Al-Hawawreh, M., Den Hartog, F., & Sitnikova, E. (2019). Targeted ransomware: A new cyber threat to edge system of brownfield industrial internet of things. IEEE Internet of Things Journal, 6(4), 7137–7151. https://doi.org/10.1109/JIOT.2019.2914390
  • Alena Yuryna Connolly, H. B. (2022). Reducing ransomware crime: Analysis of victims' payment decisions. Computers & Security, 119, 1–14. https://doi.org/10.1016/j.cose.2022.102760
  • Alzahrani, S., Xiao, Y., & Sun, W. (2022). An analysis of conti ransomware leaked source codes. Institute of Electrical and Electronics Engineers Access, 10, 100178–100193. https://doi.org/10.1109/ACCESS.2022.3207757
  • Baig, Z., Mekala, S. H., & Zeadally, S. (2023). Ransomware attacks of the COVID-19 pandemic: Novel strains, victims, and threat actors. IT Professional, 25(5), 37–44. https://doi.org/10.1109/MITP.2023.3297085
  • Bander Ali Saleh Al-Rimy, M. M., & Zainudeen Mohd Shaid, S. (2018). Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions. Computers & Security, 74, 144–166. https://doi.org/10.1016/j.cose.2018.01.001
  • Benmalek, M. (2024). Ransomware on cyber-physical systems: Taxonomies, case studies, security gaps, and open challenges. Internet of Things and Cyber-Physical Systems, 4, 186–202. https://doi.org/10.1016/j.iotcps.2023.12.001
  • Craig Beaman, A. B., David Akande, T., Hakak, S., & Khurram Khan, M. (2021). Ransomware: Recent advances, analysis, challenges and future research directions. Computers & Security, 111, 1–22. https://doi.org/10.1016/j.cose.2021.102490
  • Dossett, J. (2021, December 31). A timeline of the biggest ransomware attacks. https://www.cnet.com/personal-finance/crypto/a-timeline-of-the-biggest-ransomware-attacks/
  • European Union. (2016). General data protection regulation: Official journal of the European union.
  • Farooq, M. S., Riaz, S., Abid, A., Umer, T., & Zikria, Y. B. (2020). Role of IoT technology in agriculture: A systematic literature review. Electronics, 9(2), 319. https://doi.org/10.3390/electronics9020319
  • Ford, J. C., White, B. J., & White, K. M. (2015). After the data breach: Notification laws and more. Issues in Information Systems, 16(4), 86–94. https://doi.org/10.48009/4_iis_2015_86-94
  • Gaskell, A. (2023). The ransomware ‘industry’ is becoming more commercial and professional than ever. Cybernews.
  • Georgescu, T.-M. (2021). A study on how the pandemic changed the cybersecurity landscape. Informatica Economica, 25(1), 42–60. https://doi.org/10.24818/issn14531305/25.1.2021.04
  • Goodin, D. (2024). Torque this - Hackers can infect network-connected wrenches to install ransomware, ARS Tecnica.
  • Gowtham Ramesh, A. M. (2020). Automated dynamic approach for detecting ransomware using finite-state machine. Decision Support Systems, 138, 1–10. https://doi.org/10.1016/j.dss.2020.113400
  • Hacquebord, F., Hilt, S., & Sancho, D. (2022). The near and far future of ransomware business models. Trend Micro Research.
  • Holden, A. (2023). Contending with artificially intelligent ransomware, vol. 2023. ISACA Journal: ISACA.
  • Huntley, S. (2023). Fog of war: How the Ukraine conflict transformed the cyber threat landscape. Google Threat Analysis Group. https://blog.google/threat-analysis-group/fog-of-war-how-the-ukraine-conflict-transformed-the-cyber-threat-landscape/
  • Krebs, B. (2023a). Conti ransomware group diaries, part II: The office. https://krebsonsecurity.com/2022/03/conti-ransomware-group-diaries-part-ii-the-office/
  • Krebs, B. (2023b). Conti ransomware group diaries, part III: Weaponry. https://krebsonsecurity.com/2022/03/conti-ransomware-group-diaries-part-iii-weaponry/
  • Lang, M., Connolly, L., Taylor, P., & Corner, P. J. (2023). The evolving menace of ransomware: A comparative analysis of pre-pandemic and mid-pandemic attacks. Digital Threats, 4(4), 1–22 Article 52. https://doi.org/10.1145/3558006
  • Lewis, J. A. (2022). Cyber war and Ukraine. Center for Strategic and International Studies. https://www.csis.org/analysis/cyber-war-and-ukraine
  • Masarah Paquet-Clouston, B. H., & Dupont, B. (2019). Ransomware payments in the bitcoin ecosystem. Journal of Cybersecurity, 5(1), 1–11. https://doi.org/10.1093/cybsec/tyz003
  • Mauro Conti, A. G., & Ruj, S. (2018). On the economic significance of ransomware campaigns: A bitcoin transactions perspective. Computers & Security, 79, 162–189. https://doi.org/10.1016/j.cose.2018.08.008
  • Meland, P. H., Bayoumy, Y. F. F., & Sindre, G. (2020). The ransomware-as-a-service economy within the darknet. Computers & Security, 92, 101762. https://doi.org/10.1016/j.cose.2020.101762
  • Ronny Richardson, M. M. N. (2017). Ransomware: Evolution, mitigation and prevention. International Management Review, 13(1), 10–21.
  • SOPHOS. (2023). The state of ransomware.
  • Teichmann, F. (2023). Ransomware attacks in the context of generative artificial intelligence—An experimental study. International Cybersecurity Law Review, 4(4), 399–414. https://doi.org/10.1365/s43439-023-00094-x
  • Teichmann, F., Boticiu, S. R., & Sergi, B. S. (2023). The evolution of ransomware attacks in light of recent cyber threats. How can geopolitical conflicts influence the cyber climate? International Cybersecurity Law Review, 4(3), 259–280. https://doi.org/10.1365/s43439-023-00095-w
  • UK National Cyber Security Centre. (2024, January 24). The near-term impact of AI on the cyber threat (U. G. C. Headquarters, Ed.). UK Government Communications Headquarters.
  • Xu, J., Gu, B., & Tian, G. (2022). Review of agricultural IoT technology. Artificial Intelligence in Agriculture, 6, 10–22. https://doi.org/10.1016/j.aiia.2022.01.001
  • Yuryna Connolly, A., & Borrion, H. (2022). Reducing ransomware crime: Analysis of victims’ payment decisions. Computers & Security, 119, 102760. https://doi.org/10.1016/j.cose.2022.102760

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.