新兴的勒索软件威胁:一种预期的伦理分析

Richard Wilson, Ion A. Iftimie
{"title":"新兴的勒索软件威胁:一种预期的伦理分析","authors":"Richard Wilson, Ion A. Iftimie","doi":"10.1109/istas52410.2021.9629211","DOIUrl":null,"url":null,"abstract":"Ransomware has become a primary security risk to businesses, and it is now the fastest-growing category of cybercrime. Furthermore, ransomware attacks on healthcare, energy and water distribution, and defense contractor organizations have begun to impact both business and national security. Traditional ransomware encrypts files on an infected computer which blocks users’ access until a sum of money or ransom is paid, often via cryptocurrencies like Bitcoin or Ethereum. Businesses and individuals who become victims of ransomware attacks are faced with the expense of paying the ransom, or restoring files from backup if this available, losing files altogether or completely restoring the files. Beginning in late 2019, cybercriminals stepped up their game by deploying new attacks known as “double-extortion” ransomware, within which files are stolen before being encrypted. Even if an organization might be able to recover its data from backups, by stealing the files first before the files are encrypted, the attacker can still profit either by selling any confidential data on the dark web or by further extorting the business and threatening to leak sensitive information unless an even larger ransom is paid. As of 2021, double-extortion ransomware is still in its infancy, but it can be anticipated that possible long-term trends toward even more persistent multiple-extortion tactics, in which stolen data could continue to be used by cybercriminals, terrorists, and rogue nation-states potentially decades in the future will continue. Traditional, passive measures in cybersecurity and business continuity, like firewalls, antivirus software, and frequent backups, are not sufficient to protect organizations from this new type of data theft and extortion enterprise. Government agencies and private corporations alike are beginning to employ active cyber threat hunters and intelligence analysts to detect and neutralize this newest class of persistent threat. This anticipatory ethical analysis will attempt to identify future threats from the development of Multiple-Extortion Ransomware and use this ethical analysis as the basis for developing policy about future ransomware developments.","PeriodicalId":314239,"journal":{"name":"2021 IEEE International Symposium on Technology and Society (ISTAS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Emerging ransomeware threats: An anticipatory ethical anaylsis\",\"authors\":\"Richard Wilson, Ion A. Iftimie\",\"doi\":\"10.1109/istas52410.2021.9629211\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Ransomware has become a primary security risk to businesses, and it is now the fastest-growing category of cybercrime. Furthermore, ransomware attacks on healthcare, energy and water distribution, and defense contractor organizations have begun to impact both business and national security. Traditional ransomware encrypts files on an infected computer which blocks users’ access until a sum of money or ransom is paid, often via cryptocurrencies like Bitcoin or Ethereum. Businesses and individuals who become victims of ransomware attacks are faced with the expense of paying the ransom, or restoring files from backup if this available, losing files altogether or completely restoring the files. Beginning in late 2019, cybercriminals stepped up their game by deploying new attacks known as “double-extortion” ransomware, within which files are stolen before being encrypted. Even if an organization might be able to recover its data from backups, by stealing the files first before the files are encrypted, the attacker can still profit either by selling any confidential data on the dark web or by further extorting the business and threatening to leak sensitive information unless an even larger ransom is paid. As of 2021, double-extortion ransomware is still in its infancy, but it can be anticipated that possible long-term trends toward even more persistent multiple-extortion tactics, in which stolen data could continue to be used by cybercriminals, terrorists, and rogue nation-states potentially decades in the future will continue. Traditional, passive measures in cybersecurity and business continuity, like firewalls, antivirus software, and frequent backups, are not sufficient to protect organizations from this new type of data theft and extortion enterprise. Government agencies and private corporations alike are beginning to employ active cyber threat hunters and intelligence analysts to detect and neutralize this newest class of persistent threat. This anticipatory ethical analysis will attempt to identify future threats from the development of Multiple-Extortion Ransomware and use this ethical analysis as the basis for developing policy about future ransomware developments.\",\"PeriodicalId\":314239,\"journal\":{\"name\":\"2021 IEEE International Symposium on Technology and Society (ISTAS)\",\"volume\":\"31 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-10-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE International Symposium on Technology and Society (ISTAS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/istas52410.2021.9629211\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE International Symposium on Technology and Society (ISTAS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/istas52410.2021.9629211","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

勒索软件已成为企业的主要安全风险,目前是增长最快的网络犯罪类型。此外,针对医疗保健、能源和供水分配以及国防承包商组织的勒索软件攻击已经开始影响商业和国家安全。传统的勒索软件对受感染计算机上的文件进行加密,阻止用户访问,直到支付一笔钱或赎金,通常是通过比特币或以太坊等加密货币支付。成为勒索软件攻击受害者的企业和个人都面临着支付赎金、从备份中恢复文件(如果有的话)、完全丢失文件或完全恢复文件的费用。从2019年底开始,网络犯罪分子通过部署被称为“双重勒索”勒索软件的新攻击加强了他们的游戏,其中文件在加密之前被盗。即使一个组织可能能够从备份中恢复数据,通过在文件被加密之前先窃取文件,攻击者仍然可以通过在暗网上出售任何机密数据或进一步勒索企业并威胁要泄露敏感信息来获利,除非支付更大的赎金。截至2021年,双重勒索勒索软件仍处于起步阶段,但可以预见的是,长期趋势可能会朝着更加持久的多重勒索策略发展,在这种策略中,被盗数据可能会继续被网络犯罪分子、恐怖分子和流氓民族国家使用,未来几十年可能还会继续。传统的、被动的网络安全和业务连续性措施,如防火墙、防病毒软件和频繁备份,不足以保护组织免受这种新型数据盗窃和勒索企业的侵害。政府机构和私营企业都开始雇佣主动网络威胁猎人和情报分析师来检测和消除这类最新的持续威胁。这种预期的道德分析将试图识别多重勒索勒索软件发展的未来威胁,并将这种道德分析作为制定未来勒索软件发展政策的基础。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Emerging ransomeware threats: An anticipatory ethical anaylsis
Ransomware has become a primary security risk to businesses, and it is now the fastest-growing category of cybercrime. Furthermore, ransomware attacks on healthcare, energy and water distribution, and defense contractor organizations have begun to impact both business and national security. Traditional ransomware encrypts files on an infected computer which blocks users’ access until a sum of money or ransom is paid, often via cryptocurrencies like Bitcoin or Ethereum. Businesses and individuals who become victims of ransomware attacks are faced with the expense of paying the ransom, or restoring files from backup if this available, losing files altogether or completely restoring the files. Beginning in late 2019, cybercriminals stepped up their game by deploying new attacks known as “double-extortion” ransomware, within which files are stolen before being encrypted. Even if an organization might be able to recover its data from backups, by stealing the files first before the files are encrypted, the attacker can still profit either by selling any confidential data on the dark web or by further extorting the business and threatening to leak sensitive information unless an even larger ransom is paid. As of 2021, double-extortion ransomware is still in its infancy, but it can be anticipated that possible long-term trends toward even more persistent multiple-extortion tactics, in which stolen data could continue to be used by cybercriminals, terrorists, and rogue nation-states potentially decades in the future will continue. Traditional, passive measures in cybersecurity and business continuity, like firewalls, antivirus software, and frequent backups, are not sufficient to protect organizations from this new type of data theft and extortion enterprise. Government agencies and private corporations alike are beginning to employ active cyber threat hunters and intelligence analysts to detect and neutralize this newest class of persistent threat. This anticipatory ethical analysis will attempt to identify future threats from the development of Multiple-Extortion Ransomware and use this ethical analysis as the basis for developing policy about future ransomware developments.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信