2020
DOI: 10.1098/rsos.190023
|View full text |Cite
|
Sign up to set email alerts
|

An economic analysis of ransomware and its welfare consequences

Abstract: We present in this work an economic analysis of ransomware, a relatively new form of cyber-enabled extortion. We look at how the illegal gains of the criminals will depend on the strategies they use, examining uniform pricing and price discrimination. We also explore the welfare costs to society of such strategies. In addition, we present the results of a pilot survey which demonstrate proof of concept in evaluating the costs of ransomware attacks. We discuss at each stage whether the different strategies we a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
18
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 27 publications
(25 citation statements)
references
References 19 publications
0
18
0
Order By: Relevance
“…Samples designed for monetary purposes utilize a variety of payment methods, mainly through cryptocurrencies such as Bitcoin, to collect ransom from the victims. This step is so important that several studies have been done on it ( Hernandez-Castro et al, 2017 , 2020 ; Laszka et al, 2017 ; Paquet-Clouston et al, 2019 ; Sokolov, 2021 ). Therefore, allocating a separate class for this purpose can lead to the production of knowledge of financial transactions related to extortionate attacks.…”
Section: Design Of Digital Extortion Ontologymentioning
confidence: 99%
“…Samples designed for monetary purposes utilize a variety of payment methods, mainly through cryptocurrencies such as Bitcoin, to collect ransom from the victims. This step is so important that several studies have been done on it ( Hernandez-Castro et al, 2017 , 2020 ; Laszka et al, 2017 ; Paquet-Clouston et al, 2019 ; Sokolov, 2021 ). Therefore, allocating a separate class for this purpose can lead to the production of knowledge of financial transactions related to extortionate attacks.…”
Section: Design Of Digital Extortion Ontologymentioning
confidence: 99%
“…Malware can be divided into different categories, including worms, trojans, rootkits, viruses, spyware, keyloggers, botnets and ransomware [ 329 ]. In particular, ransomware attacks have become popular in recent years with the aim of hijacking a system whose files are encrypted with an attacker’s key, and ask for some payment in cryptocurrencies to restore them [ 349 ].…”
Section: Information Security: Requirements Attacks and Solutionsmentioning
confidence: 99%
“…Among the key works in this substream, August et al [1] consider the perspective of a software vendor, in particular how the underlying economic externalities affect the vendor's pricing strategy. In contrast, Hernandez-Castro et al [6] examine the perspective of the ransomware attackers and how price-discrimination strategies employed by the attackers would impact social welfare. Laszka et al [7] investigate the decision of the potential victims to invest in backup technologies and to what extent such technologies can serve as a deterrent.…”
Section: Introductionmentioning
confidence: 99%