2019
DOI: 10.3837/tiis.2019.06.027
|View full text |Cite
|
Sign up to set email alerts
|

Recent Advances in Cryptovirology: State-of-the-Art Crypto Mining and Crypto Ransomware Attacks

Abstract: Recently, ransomware has earned itself an infamous reputation as a force to reckon with in the cybercrime landscape. However, cybercriminals are adopting other unconventional means to seamlessly attain proceeds of cybercrime with little effort. Cybercriminals are now acquiring cryptocurrencies directly from benign Internet users without the need to extort a ransom from them, as is the case with ransomware. This paper investigates advances in the cryptovirology landscape by examining the state-of-the-art crypto… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 15 publications
(20 reference statements)
0
2
0
Order By: Relevance
“…Due to its anonymity and difficulty in being tracked, cryptocurrencies like Bitcoin have become more and more in demand by ransomware attackers in recent years (Alqahtani and Sheldon, 2022). Receiving payments in Bitcoins is quite simple for the attackers since they simply need to supply a Bitcoin wallet address (Zimba et al , 2019). A recent example of a ransomware attack on All India Institute of Medical Sciences computer systems demanded Rs 200 crore in cryptocurrency to restore data.…”
Section: Resultsmentioning
confidence: 99%
“…Due to its anonymity and difficulty in being tracked, cryptocurrencies like Bitcoin have become more and more in demand by ransomware attackers in recent years (Alqahtani and Sheldon, 2022). Receiving payments in Bitcoins is quite simple for the attackers since they simply need to supply a Bitcoin wallet address (Zimba et al , 2019). A recent example of a ransomware attack on All India Institute of Medical Sciences computer systems demanded Rs 200 crore in cryptocurrency to restore data.…”
Section: Resultsmentioning
confidence: 99%
“…The victim receives access codes to unlock their mobile device once they pay the ransom. Attackers can generate bitcoin by surreptitiously carrying out calculations on a victim's device through the use of cryptomining malware [2]. Trojan code, which is concealed in apps that appear authentic, is frequently used for cryptocurrency mining.…”
Section: Introductionmentioning
confidence: 99%