Ransomware reloaded: Re-examining its trend, research and mitigation in the era of data exfiltration
Ransomware has grown to be a dominant cybersecurity threat by exfiltrating, encrypting, or
destroying valuable user data and causing numerous disruptions to victims. The severity of …
destroying valuable user data and causing numerous disruptions to victims. The severity of …
Crypto-ransomware: A revision of the state of the art, advances and challenges
According to the premise that the first step to try to solve a problem is to deepen our
knowledge of it as much as possible, this work is mainly aimed at diving into and …
knowledge of it as much as possible, this work is mainly aimed at diving into and …
A tale of two markets: Investigating the ransomware payments economy
A Tale of Two Markets: Investigating the Ransomware Payments Economy Page 1 DOI:10.1145/3582489
A data-driven, follow-the-money approach to characterize the ransomware ecosystem …
A data-driven, follow-the-money approach to characterize the ransomware ecosystem …
Improving cryptocurrency crime detection: Coinjoin community detection approach
The potential of Bitcoin for money laundering and terrorist financing represents a significant
challenge in law enforcement. In recent years, the use of privacy-improving CoinJoin …
challenge in law enforcement. In recent years, the use of privacy-improving CoinJoin …
Ransomware: How attacker's effort, victim characteristics and context influence ransom requested, payment and financial loss
In recent years, ransomware attacks have led to disastrous consequences for victims, not
just due to the payment ransom amount but also due to the recovery costs associated with …
just due to the payment ransom amount but also due to the recovery costs associated with …
Ransomware economics: a two-step approach to model ransom paid
Ransomware poses a significant and pressing challenge in today's society. Mitigation efforts
aim to reduce the profitability of ransomware attacks. Nevertheless, limited research has …
aim to reduce the profitability of ransomware attacks. Nevertheless, limited research has …
Visual analysis of money laundering in cryptocurrency exchange
F Zhou, Y Chen, C Zhu, L Jiang, X Liao… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Blockchain-based cryptocurrencies, such as Bitcoin (BTC) and Ethereum (ETH), are newly
emerging financial assets. Cryptocurrency exchanges are marketplaces for cryptocurrency …
emerging financial assets. Cryptocurrency exchanges are marketplaces for cryptocurrency …
Structural identity representation learning for blockchain-enabled metaverse based on complex network analysis
The metaverse and its underlying blockchain technology have attracted extensive attention
in the past few years. How to mine, process, and analyze the tremendous data generated by …
in the past few years. How to mine, process, and analyze the tremendous data generated by …
From payday to payoff: Exploring the money laundering strategies of cybercriminals
M Nazzari - Trends in Organized Crime, 2023 - Springer
Cybercriminals are commonly assumed to engage in cybercrime for monetary rewards. Like
traditional offenders, they must launder their illicit proceeds to obscure the permanent trails …
traditional offenders, they must launder their illicit proceeds to obscure the permanent trails …
[HTML][HTML] Context matters: Methods for Bitcoin tracking
Bitcoin and other cryptocurrencies are well-known for their privacy properties that allow for
the “anonymous” exchange of money. Bitcoin tracking with taint analysis remains …
the “anonymous” exchange of money. Bitcoin tracking with taint analysis remains …