Abstract
With the advancement of technology, cybercriminals have found new ways of earning money, and among them ransomware is most popular. Ransomware intrusively parses the data of organization or individual then locks it through encryption mechanisms then demands the user by forcing him/her to pay ransom in form of Bitcoin to retrieve his/her data back. This paper attempts to present various aspects of ransomware, its emergence, historical insights, and various routes that may be adopted by ransomware practitioners.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
www.cyberthreatalliance.org/cryptowall-executive-summary.pdf
Chatterjee JM, Son L, Ghatak S et al (2017) BitCoin exclusively informational money: a valuable review from 2010 to 2017. Int J Meth Springer 1–18
Ateniese G, Faonio A, Magri B, De Medeiros B (2014) Certified bitcoins. In: International conference on applied cryptography and network security, Springer, Cham, pp 80–96
Khari M (2018) Comprehensive study of cloud computing and related security issues. In: Big data analytics. Springer, Singapore, pp 699–707
O’Gorman G, McDonald G (2012) Ransomware: a growing menace. Symantec corporation
Scaife N, Carter H, Traynor P, Butler KR (2016) Cryptolock (and drop it): stopping ransomware attacks on user data. In: IEEE 36th international conference on distributed computing systems (ICDCS), pp 303–312
Brewer R (2016) Ransomware attacks: detection, prevention and cure. In: Network security, pp 5–9
Salvi HU, Kerkar RV (2016) Ransomware: a cyber extortion. Asian J Convergence Technol 2(3)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Dhawan, S., Narwal, B. (2019). Unfolding the Mystery of Ransomware. In: Bhattacharyya, S., Hassanien, A., Gupta, D., Khanna, A., Pan, I. (eds) International Conference on Innovative Computing and Communications. Lecture Notes in Networks and Systems, vol 55. Springer, Singapore. https://doi.org/10.1007/978-981-13-2324-9_4
Download citation
DOI: https://doi.org/10.1007/978-981-13-2324-9_4
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-2323-2
Online ISBN: 978-981-13-2324-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)