Introduction.- Genesis of Ransomware.- Evolution of Applied Cryptography.- Ransomware Economics.- Ransomware Case Studies.- Dangerous Convergences.- Auxiliary Impacts.- Failed Translations.- The Sociology of Ransomware.- Conclusion.
Dr Ryan is an Australian cybersecurity researcher specializing in enterprise cyber security, strategy, and risk management practices. Dr Ryan is a currently a cyber resilience expert for the Australian Prudential Regulatory Authority (APRA), which is responsible for the ongoing development of prudential cyber security standards, and for evaluating the cybersecurity and technology resilience for many of Australia’s largest financial institutions. Concurrently he serves as cyber security researcher and industry fellow for the University of New South Wales School of Business and the Australian Cyber Security Centre (ACSC).
This book explores the genesis of ransomware and how the parallel emergence of encryption technologies has elevated ransomware to become the most prodigious cyber threat that enterprises are confronting. It also investigates the driving forces behind what has been dubbed the ‘ransomware revolution’ after a series of major attacks beginning in 2013, and how the advent of cryptocurrencies provided the catalyst for the development and increased profitability of ransomware, sparking a phenomenal rise in the number and complexity of ransomware attacks.
This book analyzes why the speed of technology adoption has been a fundamental factor in the continued success of financially motivated cybercrime, and how the ease of public access to advanced encryption techniques has allowed malicious actors to continue to operate with increased anonymity across the internet. This anonymity has enabled increased collaboration between attackers, which has aided the development of new ransomware attacks, and led to an increasing level of technical complexity in ransomware attacks. This book highlights that the continuous expansion and early adoption of emerging technologies may be beyond the capacity of conventional risk managers and risk management frameworks.
Researchers and advanced level students studying or working in computer science, business or criminology will find this book useful as a reference or secondary text. Professionals working in cybersecurity, cryptography, information technology, financial crime (and other related topics) will also welcome this book as a reference.