2023
DOI: 10.3390/electronics12214494
|View full text |Cite
|
Sign up to set email alerts
|

Crypto-Ransomware: A Revision of the State of the Art, Advances and Challenges

José Antonio Gómez Hernández,
Pedro García Teodoro,
Roberto Magán Carrión
et al.

Abstract: According to the premise that the first step to try to solve a problem is to deepen our knowledge of it as much as possible, this work is mainly aimed at diving into and understanding crypto-ransomware, a very present and true-world digital pandemic, from several perspectives. With this aim, this work contributes the following: (a) a review of the fundamentals of this security threat, typologies and families, attack model and involved actors, as well as lifecycle stages; (b) an analysis of the evolution of ran… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
8
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(8 citation statements)
references
References 223 publications
0
8
0
Order By: Relevance
“…The final, most common, and arguably most harmful type of ransomware is cryptoransomware [2,4]. As the name implies, it encrypts user data, such as work-related and private documents.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations
“…The final, most common, and arguably most harmful type of ransomware is cryptoransomware [2,4]. As the name implies, it encrypts user data, such as work-related and private documents.…”
Section: Introductionmentioning
confidence: 99%
“…The increasing number of ransomware attacks in recent years has led to a corresponding rise in research dedicated to ransomware detection. The methods can be broadly divided into static, which attempt to recognize ransomware without letting it execute, and dynamic, which focus on monitoring the consequences of executing ransomware [2][3][4]. Both approaches increasingly rely on machine learning, and both work well as complementary methods [6].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…With the widespread adoption of this technology, cybercriminals use forged identities or stolen credit cards to take advantage of free offers to mine cryptocurrencies provided by cloud service providers [13]. Cybercrimes, particularly hacking and ransomware, are associated with cryptocurrencies [14][15][16]. This further complicates the investigation of such crimes, as there is currently no legislation regarding the seizure of virtual assets.…”
Section: Introductionmentioning
confidence: 99%