2019
DOI: 10.1093/cybsec/tyz003
|View full text |Cite
|
Sign up to set email alerts
|

Ransomware payments in the Bitcoin ecosystem

Abstract: Ransomware can prevent a user from accessing a device and its files until a ransom is paid to the attacker, most frequently in Bitcoin. With over 500 known ransomware families, it has become one of the dominant cybercrime threats for law enforcement, security professionals and the public. However, a more comprehensive, evidence-based picture on the global direct financial impact of ransomware attacks is still missing. In this paper, we present a data-driven method for identifying and gathering information on B… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
80
0
1

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
2
2

Relationship

1
8

Authors

Journals

citations
Cited by 135 publications
(82 citation statements)
references
References 19 publications
(45 reference statements)
1
80
0
1
Order By: Relevance
“…Because the Bitcoin transaction graph is completely public it is clear that Bitcoin flows can be traced, although this is limited by merging transactions [24]. Recent analysis of ransomware attacks and associated bitcoin transactions can be found in [9], [16], [21].…”
Section: B Related Workmentioning
confidence: 99%
“…Because the Bitcoin transaction graph is completely public it is clear that Bitcoin flows can be traced, although this is limited by merging transactions [24]. Recent analysis of ransomware attacks and associated bitcoin transactions can be found in [9], [16], [21].…”
Section: B Related Workmentioning
confidence: 99%
“…Survey evidence suggests that many businesses do indeed pay the ransom [8]. We also have evidence of large profits for ransomware criminals [9,10]. The example of South Korean web-hosting firm Nayana paying a $1 million ransom in 2017 amply demonstrates how lucrative ransomware can be for criminals.…”
Section: Introductionmentioning
confidence: 82%
“…Therefore, the proposed study offers two techniques to uncover Bitcoin transactions. First, there are many empirical studies in the information technology area that discuss techniques to reduce the anonymity of bitcoin transactions [14], [15], [16], [17], [18], [19], [20], [21], [1].…”
Section: Current Studymentioning
confidence: 99%
“…Once the bitcoin address is attached to a person, we will house that information in a separate database that holds blacklisted bitcoin addresses. As displayed in Figure 3, our model consists of ten steps: 1) Method-1: Test proposed algorithms by researchers to de-anonymize Bitcoin transactions used in ransomware attacks 2) Method-2: Identify ransomware related Bitcoin addresses and track the incoming and outgoing traffic as explained in Paquet-Clouston et al's study [1].…”
Section: Current Studymentioning
confidence: 99%