Abstract
This article aims to analyze the current unpredictable cyber climate. In particular, Russia’s invasion of Ukraine has heightened concerns about security incidents, and ransomware attacks have become a credible threat to businesses around the world. Ransomware attackers often target large companies or companies holding sensitive data, and companies have suffered significant losses in monetary terms and business opportunities. The main research methodology used for this study is desk research. Specifically, an extensive literature review was conducted on the latest trends in ransomware and geopolitical conflict in order to provide an overview of the current cyber climate in light of recent events. We contribute to the literature by investigating recent ransomware attacks, focusing on how the ransom is paid, how the money is transferred to the criminals, how the cryptocurrencies might be recovered, and how sustainability and cybersecurity are linked. These issues have yet to be sufficiently debated amid the latest events in Ukraine and the ransomware gangs’ involvement in geopolitical conflicts. This study provides researchers with a means of assessing vulnerabilities, revealing a path for intended research.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Primary Literature
Ahmed U, Lin JCW, Srivastava G (2022) Mitigating adversarial evasion attacks of ransomware using ensemble learning. Comput Electr Eng 100:107903
Al-Hamar Y, Kolivand H, Tajdini M, Saba T, Ramachandran V (2021) Enterprise credential spear-phishing attack detection. Comput Electr Eng 94:107363
Al-Hasnawi AHM (2022) Cyberspace and its impact on the growing geopolitical power of russia during the era of Vladimir Putin: a geopolitical vision. World Bull Soc Sci 10:72–82
Alqahtani A, Sheldon FT (2022) A survey of crypto Ransomware attack detection methodologies: an evolving outlook. Sensors 22(5):1837
Alwashali AAMA, Rahman ANA, Ismail N (2021) A survey of Ransomware as a service (RaaS) and methods to mitigate the attack. 14th International Conference on Developments in eSystems Engineering (DeSE), 2021, pp 92–96
Aman MN, Javaid U, Sikdar B (2021) IoT-proctor: a secure and lightweight device patching framework for mitigating malware spread in IoT networks. IEEE Syst J. https://doi.org/10.1109/JSYST.2021.3070404
Amos Z (2023) What are the legal implications of a ransomware attack? https://incyber.org/en/what-are-legal-implications-ransomware-attack/. Accessed 16 June 2023
Baker K (2022) Ransomware as a service (RaaS) explained. https://www.crowdstrike.com/cybersecurity-101/ransomware/ransomware-as-a-service-raas/. Accessed 23 June 2022
Balta W, S, Chawla M, Dencik J, Lin S (2022) Sustenability as a transformation catalyst. https://www.ibm.com/thought-leadership/institute-business-value/report/sustainability-transformation. Accessed 23 Aug 2022
Beaman C, Barkworth A, Akande TD, Hakak S, Khan MK (2021) Ransomware: recent advances, analysis, challenges and future research directions. Comput Secur 111:102490
Bertia A, Xavier SB, Kathrine GJW, Palmer GM (2022) A study about detecting Ransomware by using different algorithms. International Conference on Applied Artificial Intelligence and Computing (ICAAIC), 2022, pp 1293–1300
Bitton R, Shabtai A (2019) A machine learning-based intrusion detection system for securing remote desktop connections to electronic flight bag servers. IEEE Trans Dependable and Secure Comput 18(3):1164–1181
Brewer R (2016) Ransomware attacks: detection, prevention and cure. Netw Secur 2016(9):5–9
Bund J, Höfer L (2022) “Sincere about ulterior motives”: the invasion of Ukraine and russia’s shapeshifting relationship with Ransomware groups. https://isnblog.ethz.ch/cyber/sincere-about-ulterior-motives-the-invasion-of-ukraine-and-russias-shapeshifting-relationship-with-ransomware-groups. Accessed 27 June 2022
Bunge J (2022) JBS paid $11 million to resolve Ransomware attack. https://www.wsj.com/articles/jbs-paid-11-million-to-resolve-ransomware-attack-11623280781. Accessed 17 Aug 2022
Chainalysis (2022) As Ransomware payments continue to grow, so too does Ransomware’s role in geopolitical conflict. https://blog.chainalysis.com/reports/2022-crypto-crime-report-preview-ransomware/. Accessed 26 June 2022
Chawla A (2022) Anonymous declares cyber war against Russia amid Ukraine war, takes down government website. https://timesofindia.indiatimes.com/gadgets-news/anonymous-declares-cyber-war-against-russia-amid-ukraine-war-takes-down-government-websites/articleshow/89825529.cms. Accessed 27 June 2022
Chen J (2020) COVID-19: Cloud Threat Landscape. https://unit42.paloaltonetworks.com/covid-19-cloud-threat-landscape/ Accessed 15 June 2023.
Chiappetta A (2019) The cybersecurity impacts on geopolitics. FormaMente 14(1):61–74
Chin K (2022) How to prevent Ransomware attacks: top 10 best practices in 2022. https://www.upguard.com/blog/best-practices-to-prevent-ransomware-attacks. Accessed 15 Aug 2022
Coufalíková A, Klaban I, Šlajs T (2021) Complex strategy against supply chain attacks. International Conference on Military Technologies (ICMT), 2021, pp 1–5
Cynet (2023) NIST incident response plan: building your own IR process based on NIST framework. https://www.cynet.com/incident-response/nist-incident-response/. Accessed 22 June 2023
D’Adamo I, González-Sánchez R, Medina-Salgado MS, Settembre-Blundo D (2021) Methodological perspective for assessing European consumers’ awareness of cybersecurity and sustainability in e‑commerce. Sustainability 13(20):11343
Danchev D (2008) Coordinated Russia vs Georgia cyber-attack in progress. https://www.zdnet.com/article/coordinated-russia-vs-georgia-cyber-attack-in-progress/. Accessed 22 June 2022
Dhawan S, Narwal B (2019) Unfolding the mystery of ransomware. International conference on innovative computing and communications. Springer, Singapore, pp 25–32
Din A (2021) Double extortion Ransomware: the new normal. https://heimdalsecurity.com/blog/double-extortion-ransomware/. Accessed 22 June 2022
Duan R, Alrawi O, Kasturi RP, Elder R, Saltaformaggio B, Lee W (2020) Towards measuring supply chain attacks on package managers for interpreted languages (arXiv preprint arXiv:2002.01139)
Duncan S, Carneiro R, Braley J, Hersh M, Ramsey F, Murch R (2022) Cybersecurity: beyond Ransomware: securing the digital food chain. Food Aust 74(1):36–40
Dunn J (2022) Has the Ukraine conflict disrupted Ransomware attacks? https://ransomware.org/blog/has-the-ukraine-conflict-disrupted-ransomware-attacks/. Accessed 9 Nov 2022
Faghihi F, Zulkernine M (2021) RansomCare: data-centric detection and mitigation against smartphone crypto-ransomware. Comput Networks 191:108011
Fein D (2021) 9 stages of ransomware: how AI responds at every stage. https://darktrace.com/blog/9-stages-of-ransomware-how-ai-responds-at-every-stage. Accessed 16 Aug 2022
Freed AM (2021) A brief history of Ransomware evolution. https://www.cybereason.com/blog/a-brief-history-of-ransomware-evolution. Accessed 21 July 2022
Gómez-Hernández JA, Sánchez-Fernández R, García-Teodoro P (2022) Inhibiting crypto-ransomware on windows platforms through a honeyfile-based approach with R‑Locker. IET Inf Secur 16(1):64–74
Gooding M (2022) Cybersecurity is an ESG concern for investors but businesses are holding back on transparency. https://techmonitor.ai/esg-and-it/esg-and-cybersecurity-investors. Accessed 19 Aug 2022
Gordon M (2015) Lessons from the front: a case study of Russian Cyber warfare. https://apps.dtic.mil/sti/citations/AD1040762. Accessed 24 June 2022
Greig J (2022) Anonymous hacktivists, ransomware groups get involved in Ukraine-Russia conflict. https://www.zdnet.com/article/anonymous-hacktivists-ransomware-groups-get-involved-in-ukraine-russia-conflict/. Accessed 27 June 2022
De Groot J (2022) A history of Ransomware attacks: the biggest and worst Ransomware attacks of all time. https://digitalguardian.com/blog/history-ransomware-attacks-biggest-and-worst-ransomware-attacks-all-time. Accessed 21 July 2022
Harrington D (2022) Ransomware-as-a-service explained: what is RaaS? https://www.varonis.com/blog/ransomware-as-a-service. Accessed 23 June 2022
Hijji M, Alam G (2021) A multivocal literature review on growing social engineering based cyber-attacks/threats during the COVID-19 pandemic: challenges and prospective solutions. IEEE Access 9:7152–7169
Hodge N (2009) Russian ‘Cyber militia’ takes Kyrgyzstan offline? https://www.wired.com/2009/01/cyber-militia-t/. Accessed 26 June 2022
Hull G, John H, Arief B (2019) Ransomware deployment methods and analysis: views from a predictive model and human responses. Crime Sci 8(1):1–22
IBM (2022) What is incident response? https://www.ibm.com/topics/incident-response. Accessed 9 Feb 2023
Ikeda S (2022) As Ukraine war rages, Conti Ransomware gang throws support behind Russian government. https://www.cpomagazine.com/cyber-security/as-ukraine-war-rages-conti-ransomware-gang-throws-support-behind-russian-government/. Accessed 27 June 2022
Johansen A (2021) What is ransomware and how to help prevent ransomware attacks. https://us.norton.com/internetsecurity-malware-ransomware-5-dos-and-donts.html. Accessed 11 Aug 2022
Kara I, Aydos M (2022) The rise of ransomware: forensic analysis for windows based ransomware attacks. Expert Syst Appl 190:116198
Karapapas C, Pittaras I, Fotiou N, Polyzos GC (2020) Ransomware as a service using smart contracts and IPFS (arXiv preprint arXiv:2003.0442)
Karlidag S, Bulut S (2020) Cyber-attacks from the political economy perspective and Turkey. Handbook of research on the political economy of communications and media. IGI Global, pp 305–321
Kelley D, Chanda D (2022) How to put cybersecurity sustainability into practice. https://www.techtarget.com/searchsecurity/tip/How-to-put-cybersecurity-sustainability-into-practice. Accessed 17 Aug 2022
Kerns Q, Payne B, Abegaz T (2021) Double-extortion Ransomware: a technical analysis of maze Ransomware. Proceedings of the future technologies conference. Springer, Cham, pp 82–94
Keshavarzi M, Ghaffary HR (2020) I2CE3: a dedicated and separated attack chain for ransomware offenses as the most infamous cyber extortion. Comput Sci Rev 36:100233
Khraisat A, Gondal I, Vamplew P, Kamruzzaman J (2019) Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecur 2(1):1–22
Kirvan P, Chapple M (2023) How to build an incident response plan, with examples, template. https://www.techtarget.com/searchsecurity/feature/5-critical-steps-to-creating-an-effective-incident-response-plan. Accessed 22 June 2023
Kochovski A (2022) Ransomware statistics, trends and facts for 2022 and beyond. https://www.cloudwards.net/ransomware-statistics/#Sources. Accessed 24 June 2022
Kost E (2022) What is Ransomware as a service (RaaS)? The dangerous threat to world security. https://www.upguard.com/blog/what-is-ransomware-as-a-service. Accessed 23 June 2022
Kovar R (2022) Ransomware through the supply chain: are organizations prepared for the new normal? https://www.infosecurity-magazine.com/opinions/ransomware-through-the-supply-chain/. Accessed 22 June 2022
Kumar S (2020) An emerging threat fileless malware: a survey and research challenges. Cybersecur 3(1):1–12
Kumar PR, Ramlie HREBH (2021) Anatomy of Ransomware: attack stages, patterns and handling techniques. International Conference on Computational Intelligence in Information System. Springer, Cham, pp 205–214
Lakhani A (2021) Analyzing the history of Ransomware across industries. https://www.fortinet.com/blog/industry-trends/analyzing-the-history-of-ransomware-across-industries. Accessed 22 July 2022
Leddy B (2021) Double extortion ransomware. https://www.darktrace.com/en/blog/double-extortion-ransomware/. Accessed 22 June 2022
Lee SJ, Shim HY, Lee YR, Park TR, Park SH, Lee IG (2022) Study on systematic ransomware detection techniques. 24th International Conference on Advanced Communication Technology (ICACT), 2022, pp 297–301
van der Linden G (2021) Malware: bad for business and the environment. https://www.capgemini.com/insights/expert-perspectives/malware-bad-for-business-and-the-environment/. Accessed 17 Aug 2022
Maalem Lahcen RA, Caulkins B, Mohapatra R, Kumar M (2020) Review and insight on the behavioral aspects of cybersecurity. Cybersecur 3(1):1–18
Margarov G, Mitrofanova E (2020) Management of Ransomware detection and prevention in multilevel environmental monitoring information system. Functional nanostructures and sensors for CBRN defence and environmental safety and security. Springer, Dordrecht, pp 125–131
Meland PH, Bayoumy YFF, Sindre G (2020) The Ransomware-as-a-service economy within the darknet. Comput Secur 92:101762
Mohurle S, Patil M (2017) A brief study of wannacry threat: Ransomware attack 2017. Int J Adv Res Comput Sci 8(5):1938–1940
Mondal S, Ghosh S, Kumar A, Islam SH, Chatterjee R (2022) Spear phishing detection: an ensemble learning approach. Data analytics, computational statistics, and operations research for engineers. CRC Press, pp 203–234
Monge MAS, Vidal JM, Villalba LJG (2018) A novel self-organizing network solution towards crypto-ransomware mitigation. Proceedings of the 13th international conference on availability, reliability and security, pp 1–10
Ohm M, Plate H, Sykosch A, Meier M (2020) Backstabber’s knife collection: a review of open source software supply chain attacks. International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. Springer, Cham, pp 23–43
Owen J (2022) Geopolitical tensions drive ransomware risks for business. https://www.securityinfowatch.com/security-executives/article/21265451/geopolitical-tensions-drive-ransomware-risks-for-business. Accessed 25 June 2022
Owen DR, Ritz K, Moses A (2023) To pay or not to pay? Key factors to consider when Ransomware strikes. https://www.law.com/newyorklawjournal/2023/05/02/to-pay-or-not-to-pay-key-factors-to-consider-when-ransomware-strikes/?slreturn=20230515091832. Accessed 16 June 2023
Paquette D (2021) The 7 stages of a Ransomware attack. https://www.zerto.com/blog/ransomware-recovery/the-7-stages-of-a-ransomware-attack/. Accessed 10 Aug 2022
Payne B, Mienie E (2021) Multiple-extortion Ransomware: the case for active cyber threat intelligence. 20th European Conference on Cyber Warfare and Security, 2021, p 331
Pechi D (2019) Predicting cyber-attacks using neural language models of sociopolitical events. https://danpechi.github.io/Dan%20Pechi%20Thesis.pdf. Accessed 25 June 2022
Phipps G (2022) Know the phases of a Ransomware attack. https://www.cybergrx.com/resources/research-and-insights/blog/know-the-phases-of-a-ransomware-attack. Accessed 17 Aug 2022
Pitchkites M (2021) Ransomware protection tips: tools & tips to protect your business in 2022. https://www.cloudwards.net/ransomware-protection/. Accessed 24 June 2022
Przetacznik J, Tarpova S (2022) Russia’s war on Ukraine: timeline of cyber-attacks. https://www.europarl.europa.eu/RegData/etudes/BRIE/2022/733549/EPRS_BRI(2022)733549_EN.pdf. Accessed 7 Nov 2022
Radcliff D (2022) How the Russia-Ukraine war makes ransomware payments harder. https://www.csoonline.com/article/3663032/how-the-russia-ukraine-war-makes-ransomware-payments-harder.html. Accessed 7 Nov 2022
Reed J (2022) Recovering ransom payments: is this the end of Ransomware? https://securityintelligence.com/articles/recovering-ransomware-payment/. Accessed 14 Aug 2022
Sajjan RS, Ghorpade VR (2017) Ransomware attacks: radical menace for cloud computing. International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), 2017, pp 1640–1646
Sarnek A, Dolan C (2022) Cybersecurity is an environmental, social and governance issue. Here’s why. https://www.weforum.org/agenda/2022/03/three-reasons-why-cybersecurity-is-a-critical-component-of-esg/. Accessed 19 Aug 2022
Sharton B (2021) Ransomware attacks are spiking. Is your company prepared? https://hbr.org/2021/05/ransomware-attacks-are-spiking-is-your-company-prepared. Accessed 24 June 2021
Shi F (2021) Threat spotlight: Ransomware trends. https://blog.barracuda.com/2021/08/12/threat-spotlight-ransomware-trends/. Accessed 20 June 2022
Simoiu C, Zand A, Thomas K, Bursztein E (2020) Who is targeted by email-based phishing and malware? measuring factors that differentiate risk. Proceedings of the ACM Internet Measurement Conference, pp 567–576
SonicWall (2022) 2022 SonicWall cyber threat report. https://www.sonicwall.com/2022-cyber-threat-report/?elqCampaignId=13998&sfc=7013h000000MiQZAA0&gclid=CjwKCAiAgbiQBhAHEiwAuQ6BkmbfNdHZWbIdJBPGBn4ut4T3yR5wDxM6JrGQbSMPEUk4O5ClyAmcVxoC7MsQAvD_BwE. Accessed 21 June 2022
Sophos (2021) The state of Ransomware 2021. https://assets.sophos.com/X24WTUEQ/at/k4qjqs73jk9256hffhqsmf/sophos-state-of-ransomware-2021-wp.pdf?cmp=120469. Accessed 20 June 2022
Srinivasan CR (2017) Hobby hackers to billion-dollar industry: the evolution of ransomware. Comput Fraud Secur 2017(11):7–9
Swinhoe D (2020) How to buy Bitcoin for ransomware payment. https://www.csoonline.com/article/3588152/how-to-buy-bitcoin-for-ransomware-payment-if-you-must.html. Accessed 16 Aug 2020
Tamkin E (2020) 10 years after the landmark attack on Estonia, is the world better prepared for cyberthreats?, foreign policy. https://foreignpolicy.com/2017/04/27/10-years-after-the-landmark-attack-on-estonia-is-the-world-better-prepared-for-cyber-threats/. Accessed 20 June 2022
Tan MKS, Goode S, Richardson A (2021) Understanding negotiated anti-malware interruption effects on user decision quality in endpoint security. Behav Inf Technol 40(9):903–932
Taylor MA, Larson EC, Thornton MA (2021) Rapid Ransomware detection through side channel exploitation. IEEE International Conference on Cyber Security and Resilience (CSR), 2021, pp 47–54
Teichmann F, Boticiu S (2023) The importance of cybersecurity incident response plans for law firms. https://jusletter.weblaw.ch/juslissues/2023/1149/the-importance-of-cy_3c77b063f1.html__ONCE&login=false. Accessed 15 June 2023
Teichmann F, Boticiu S, Sergi BS (2022) Ransomware—a growing threat for law firms. https://jusletter.weblaw.ch/juslissues/2022/1126/ransomware---a-growi_5933ba139a.html__ONCE&login=false. Accessed 16 June 2023
Thakur S, Chaudhari S, Joshi B (2022) Ransomware: threats, identification and prevention, pp 361–387
Thomas J (2018) Individual cyber security: empowering employees to resist spear phishing to prevent identity theft and ransomware attacks. J Bus Manag 12(3):1–23
Tikk E, Kaska K, Vihul L (2010) International cyber incidents: legal considerations. https://ccdcoe.org/library/publications/international-cyber-incidents-legal-considerations/ Accessed 22 June 2023
Traynor I (2007) Russia accused of unleashing cyberwar to disable Estonia. Guardian. https://www.theguardian.com/world/2007/may/17/topstories3.russia Accessed 15 June 2023
Tunggal A (2023) What is an incident response plan? https://www.upguard.com/blog/incident-response-plan. Accessed 22 June 2023
Urooj U, Maarof MAB, Al-rimy BAS (2021) A proposed adaptive pre-encryption crypto-ransomware early detection model. 3rd International Cyber Resilience Conference (CRC), 2021, pp 1–6
Vail E (2022) Russia or Ukraine: hacking groups take sides. https://therecord.media/russia-or-ukraine-hacking-groups-take-sides/. Accessed 27 June 2022
Venteicher B (2022) Cybersecurity for a more sustainable future. https://securityintelligence.com/posts/cybersecurity-sustainable-future/. Accessed 19 Aug 2022
Verma RM, Zeng V, Faridi H (2019) Data quality for security challenges: case studies of phishing, malware and intrusion detection datasets. Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp 2605–2607
Wray R, Massey L, Medina J, Bolton A (2020) Increasing engagement in a cyber-awareness training game. International Conference on Human-Computer Interaction. Springer, Cham, pp 147–158
Xiao M (2022) Ransomware shifts toward destructive attacks as ‘geopolitical tensions’ take hold. https://www.scmagazine.com/analysis/ransomware/dragos-tracks-shift-in-ransomware-toward-destructive-attacks-as-geopolitical-tensions-take-hold. Accessed 7 Nov 2022
Young AL, Yung M (2017) Cryptovirology: the birth, neglect, and explosion of ransomware. Commun ACM 60(7):24–26
Yunus YKBM, Ngah SB (2021) Ransomware: stages, detection and evasion. International Conference on Software Engineering & Computer Systems and 4th International Conference on Computational Science and Information Management (ICSECS-ICOCSIM), 2021, pp 227–231
Further Reading
Bello I, Chiroma H, Abdullahi UA, Gital AYU, Jauro F, Khan A, Abdulhamid SIM (2021) Detecting ransomware attacks using intelligent algorithms: recent development and next direction from deep learning and big data perspectives. J Ambient Intell Human Comput 12(9):8699–8717
Gallagher R, Bloomberg (2021) https://fortune.com/2021/11/08/police-arrest-five-people-tied-to-ransomware-group-revil/. Accessed 24 June 2022
Herrera Silva JA, Barona López LI, Valdivieso Caraguay ÁL, Hernández-Álvarez M (2019) A survey on situational awareness of ransomware attacks—detection and prevention parameters. Remote Sens 11(10):1168
Huang DY, Aliapoulios MM, Li VG, Invernizzi L, Bursztein E, McRoberts K, McCoy D et al (2018) Tracking ransomware end-to-end. IEEE Symposium on Security and Privacy (SP), 2018, pp 618–631
Lavorgna A, Antonopoulos GA (2022) Criminal markets and networks in cyberspace. Trends Organ Crime. https://doi.org/10.1007/s12117-022-09450-5
McDermott D (2022) What global geopolitics means for your cybersecurity? https://www.getcyberresilient.com/threat-insights/what-global-geopolitics-means-your-cybersecurity. Accessed 15 June 2022
Musotto R, Wall DS (2020) More Amazon than Mafia: analysing a DDoS stresser service as organised cybercrime. Trends Organ Crime. https://doi.org/10.1007/s12117-020-09397-5
Naylor B, Johnson C (2021) U.S. indicts 2 men behind major ransomware attacks. https://www.npr.org/2021/11/08/1053599349/u-s-indicts-2-men-behind-ransomware-attacks-over-the-summer. Accessed 24 June 2022
New York Times (2021) F.B.I director compares danger of Ransomware to 9/11 terror threat. https://www.nytimes.com/2021/06/04/us/politics/ransomware-cyberattacks-sept-11-fbi.html. Accessed 21 June 2022
O’Kane P, Sezer S, Carlin D (2018) Evolution of ransomware. IET Networks 7(5):321–327
Partida D (2022) Recent Ransomware attacks & what we learned. https://www.cioinsight.com/security/recent-ransomware-attacks/. Accessed 21 June 2022
Raju AD, Abualhaol IY, Giagone RS, Zhou Y, Huang S (2021) A survey on cross-architectural iot malware threat hunting. IEEE Access 9:91686–91709
Ryan P, Fokker J, Healy S, Amann A (2022) Dynamics of targeted ransomware negotiation. IEEE Access 10:32836–32844
Sganga N (2021) JBS paid $11 million ransom after cyberattack. https://www.cbsnews.com/news/jbs-ransom-11-million/. Accessed 21 June 2022
Tandon A, Nayyar A (2019) A comprehensive survey on ransomware attack: a growing havoc cyberthreat. Data Manag Anal Innov. https://doi.org/10.1007/978-981-13-1274-8_31
Author information
Authors and Affiliations
Contributions
All authors contributed to the conception and design of the study.
Corresponding author
Ethics declarations
Conflict of interest
F. Teichmann, S.R. Boticiu, and B.S. Sergi declare that they have no competing interests.
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Data Availability Statement
The data used to support the findings of this study are included in the article.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Teichmann, F., Boticiu, S.R. & Sergi, B.S. The evolution of ransomware attacks in light of recent cyber threats. How can geopolitical conflicts influence the cyber climate?. Int. Cybersecur. Law Rev. 4, 259–280 (2023). https://doi.org/10.1365/s43439-023-00095-w
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1365/s43439-023-00095-w