Ransomware reloaded: Re-examining its trend, research and mitigation in the era of data exfiltration

T McIntosh, T Susnjak, T Liu, D Xu, P Watters… - ACM Computing …, 2024 - dl.acm.org
Ransomware has grown to be a dominant cybersecurity threat by exfiltrating, encrypting, or
destroying valuable user data and causing numerous disruptions to victims. The severity of …

Crypto-ransomware: A revision of the state of the art, advances and challenges

JA Gómez Hernández, P García Teodoro… - Electronics, 2023 - mdpi.com
According to the premise that the first step to try to solve a problem is to deepen our
knowledge of it as much as possible, this work is mainly aimed at diving into and …

A tale of two markets: Investigating the ransomware payments economy

K Oosthoek, J Cable, G Smaragdakis - Communications of the ACM, 2023 - dl.acm.org
A Tale of Two Markets: Investigating the Ransomware Payments Economy Page 1 DOI:10.1145/3582489
A data-driven, follow-the-money approach to characterize the ransomware ecosystem …

Improving cryptocurrency crime detection: Coinjoin community detection approach

A Wahrstätter, J Gomes, S Khan… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The potential of Bitcoin for money laundering and terrorist financing represents a significant
challenge in law enforcement. In recent years, the use of privacy-improving CoinJoin …

Ransomware: How attacker's effort, victim characteristics and context influence ransom requested, payment and financial loss

T Meurs, M Junger, E Tews… - 2022 APWG symposium …, 2022 - ieeexplore.ieee.org
In recent years, ransomware attacks have led to disastrous consequences for victims, not
just due to the payment ransom amount but also due to the recovery costs associated with …

Ransomware economics: a two-step approach to model ransom paid

T Meurs, E Cartwright, A Cartwright… - … on Electronic Crime …, 2023 - ieeexplore.ieee.org
Ransomware poses a significant and pressing challenge in today's society. Mitigation efforts
aim to reduce the profitability of ransomware attacks. Nevertheless, limited research has …

Visual analysis of money laundering in cryptocurrency exchange

F Zhou, Y Chen, C Zhu, L Jiang, X Liao… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Blockchain-based cryptocurrencies, such as Bitcoin (BTC) and Ethereum (ETH), are newly
emerging financial assets. Cryptocurrency exchanges are marketplaces for cryptocurrency …

Structural identity representation learning for blockchain-enabled metaverse based on complex network analysis

B Tao, HN Dai, H **e, FL Wang - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The metaverse and its underlying blockchain technology have attracted extensive attention
in the past few years. How to mine, process, and analyze the tremendous data generated by …

From payday to payoff: Exploring the money laundering strategies of cybercriminals

M Nazzari - Trends in Organized Crime, 2023 - Springer
Cybercriminals are commonly assumed to engage in cybercrime for monetary rewards. Like
traditional offenders, they must launder their illicit proceeds to obscure the permanent trails …

[HTML][HTML] Context matters: Methods for Bitcoin tracking

T Tironsakkul, M Maarek, A Eross, M Just - Forensic Science International …, 2022 - Elsevier
Bitcoin and other cryptocurrencies are well-known for their privacy properties that allow for
the “anonymous” exchange of money. Bitcoin tracking with taint analysis remains …