Skip to main content

On the Economics of Ransomware

  • Conference paper
  • First Online:
Decision and Game Theory for Security (GameSec 2017)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10575))

Included in the following conference series:

Abstract

While recognized as a theoretical and practical concept for over 20 years, only now ransomware has taken centerstage as one of the most prevalent cybercrimes. Various reports demonstrate the enormous burden placed on companies, which have to grapple with the ongoing attack waves. At the same time, our strategic understanding of the threat and the adversarial interaction between organizations and cybercriminals perpetrating ransomware attacks is lacking.

In this paper, we develop, to the best of our knowledge, the first game-theoretic model of the ransomware ecosystem. Our model captures a multi-stage scenario involving organizations from different industry sectors facing a sophisticated ransomware attacker. We place particular emphasis on the decision of companies to invest in backup technologies as part of a contingency plan, and the economic incentives to pay a ransom if impacted by an attack. We further study to which degree comprehensive industry-wide backup investments can serve as a deterrent for ongoing attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    Since we interpret effort \(b_i\) primarily as the frequency of backups, the fraction \(\frac{1}{b_i}\) is proportional to the expected time since the last backup. Consequently, we assume that data losses are inversely proportional to \(b_i\). Note that alternative interpretations, such as assuming \(b_i\) to be the level of sophistication of backups (e.g., air-gapping), which determines the probability that the backups remain uncompromised, also imply a similar relationship.

  2. 2.

    We are unaware of any behavioral study that specifically investigates the impact of the present bias behavioral discount factor on backup decisions, but industry experts argue strongly for its relevance. For example, in the context of the 2017 WannaCry ransomware attacks a commentary about backups stated: “This may be stating the obvious, but it’s still amazing to know the sheer number of companies that keep procrastinating over this important task [32].”

  3. 3.

    The reasoning is as follows: “When electronic protected health information (ePHI) is encrypted as the result of a ransomware attack, a breach has occurred because the ePHI encrypted by the ransomware was acquired (i.e., unauthorized individuals have taken possession or control of the information), and thus is a “disclosure” not permitted under the HIPAA Privacy Rule [30]”.

References

  1. Acquisti, A., Grossklags, J.: What can behavioral economics teach us about privacy? In: Digital Privacy: Theory, Technologies, and Practices, pp. 363–379. Auerbach Publications (2007)

    Google Scholar 

  2. Andronio, N., Zanero, S., Maggi, F.: HelDroid: Dissecting and detecting mobile ransomware. In: Bos, H., Monrose, F., Blanc, G. (eds.) RAID 2015. LNCS, vol. 9404, pp. 382–404. Springer, Cham (2015). doi:10.1007/978-3-319-26362-5_18

    Chapter  Google Scholar 

  3. Backblaze: Backup awareness survey, our 10th year, industry report. https://www.backblaze.com/blog/backup-awareness-survey/

  4. Baddeley, M.: Information security: Lessons from behavioural economics. In: Workshop on the Economics of Information Security (WEIS) (2011)

    Google Scholar 

  5. Becker, G.: Crime and punishment: an economic approach. J. Polit. Econ. 76(2), 169–217 (1968)

    Article  Google Scholar 

  6. Brandt, P., George, J., Sandler, T.: Why concessions should not be made to terrorist kidnappers. Eur. J. Polit. Econ. 44, 41–52 (2016)

    Article  Google Scholar 

  7. Bruskin Research: Nearly one in four computer users have lost content to blackouts, viruses and hackers according to new national survey, survey conducted for Iomega Corporation (2001)

    Google Scholar 

  8. Fink, A., Pingle, M.: Kidnap insurance and its impact on kidnapping outcomes. Public Choice 160(3), 481–499 (2014)

    Article  Google Scholar 

  9. Finkle, J.: Ransomware: Extortionist hackers borrow customer-service tactics (2016). http://www.reuters.com/article/us-usa-cyber-ransomware-idUSKCN0X917X

  10. Fultz, N., Grossklags, J.: Blue versus Red: towards a model of distributed security attacks. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 167–183. Springer, Heidelberg (2009). doi:10.1007/978-3-642-03549-4_10

    Chapter  Google Scholar 

  11. Gazet, A.: Comparative analysis of various ransomware virii. J. Comput. Virol. 6(1), 77–90 (2010)

    Article  Google Scholar 

  12. Grossklags, J., Christin, N., Chuang, J.: Secure or insure?: A game-theoretic analysis of information security games. In: Proceedings of the 17th International World Wide Web Conference, pp. 209–218 (2008)

    Google Scholar 

  13. Grossklags, J., Barradale, N.J.: Social status and the demand for security and privacy. In: De Cristofaro, E., Murdoch, S.J. (eds.) PETS 2014. LNCS, vol. 8555, pp. 83–101. Springer, Cham (2014). doi:10.1007/978-3-319-08506-7_5

    Google Scholar 

  14. IBM: IBM study: Businesses more likely to pay ransomware than consumers, industry report (2016). http://www-03.ibm.com/press/us/en/pressrelease/51230.wss

  15. Kabooza: Global backup survey: About backup habits, risk factors, worries and data loss of home PCs, January 2009. http://www.kabooza.com/globalsurvey.html

  16. Kharraz, A., Arshad, S., Mulliner, C., Robertson, W., Kirda, E.: UNVEIL: A large-scale, automated approach to detecting ransomware. In: Proceedings of the 25th USENIX Security Symposium (USENIX Security), pp. 757–772 (2016)

    Google Scholar 

  17. Kharraz, A., Robertson, W., Balzarotti, D., Bilge, L., Kirda, E.: Cutting the Gordian Knot: A look under the hood of ransomware attacks. In: Almgren, M., Gulisano, V., Maggi, F. (eds.) DIMVA 2015. LNCS, vol. 9148, pp. 3–24. Springer, Cham (2015). doi:10.1007/978-3-319-20550-2_1

    Chapter  Google Scholar 

  18. KnowBe4: The 2017 endpoint protection ransomware effectiveness report, industry report (2017). https://www.knowbe4.com/hubfs/Endpoint%20Protection%20Ransomware%20Effectiveness%20Report.pdf

  19. Laszka, A., Felegyhazi, M., Buttyan, L.: A survey of interdependent information security games. ACM Comput. Surv. 47(2), 23:1–23:38 (2014)

    Article  Google Scholar 

  20. Laszka, A., Farhang, S., Grossklags, J.: On the economics of ransomware. CoRR abs/1707.06247 (2017). http://arxiv.org/abs/1707.06247

  21. Liao, K., Zhao, Z., Doupé, A., Ahn, G.J.: Behind closed doors: Measurement and analysis of CryptoLocker ransoms in Bitcoin. In: Proceedings of the 2016 APWG Symposium on Electronic Crime Research (eCrime) (2016)

    Google Scholar 

  22. Luo, X., Liao, Q.: Awareness education as the key to ransomware prevention. Inf. Syst. Secur. 16(4), 195–202 (2007)

    Article  Google Scholar 

  23. Luo, X., Liao, Q.: Ransomware: A new cyber hijacking threat to enterprises. In: Gupta, J., Sharma, S. (eds.) Handbook of Research on Information Security and Assurance, pp. 1–6. IGI Global (2009)

    Google Scholar 

  24. O’Donoghue, T., Rabin, M.: Doing it now or later. Am. Econ. Rev. 89(1), 103–124 (1999)

    Article  Google Scholar 

  25. O’Gorman, G., McDonald, G.: Ransomware: A growing menace. Symantec Security Response (2012)

    Google Scholar 

  26. Proofpoint: Threat summary: Q4 2016 & year in review, industry report. https://www.proofpoint.com/sites/default/files/proofpoint_q4_threat_report-final-cm.pdf

  27. Scaife, N., Carter, H., Traynor, P., Butler, K.: Cryptolock (and drop it): Stopping ransomware attacks on user data. In: Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS), pp. 303–312 (2016)

    Google Scholar 

  28. Schechter, S.E., Smith, M.D.: How much security is enough to stop a thief? In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 122–137. Springer, Heidelberg (2003). doi:10.1007/978-3-540-45126-6_9

    Chapter  Google Scholar 

  29. Simon, R.: Mirai, BrickerBot, Hajime attack a common IoT weakness (2017). https://securingtomorrow.mcafee.com/mcafee-labs/mirai-brickerbot-hajime-attack-common-iot-weakness/

  30. U.S. Department of Health & Human Service: Fact sheet: Ransomware and HIPAA (2016). https://www.hhs.gov/sites/default/files/RansomwareFactSheet.pdf

  31. Varian, H.: System reliability and free riding. In: Camp, L., Lewis, S. (eds.) Economics of Information Security (Advances in Information Security), vol. 12, pp. 1–15. Kluwer Academic Publishers, Dordrecht (2004)

    Chapter  Google Scholar 

  32. Venkat, S.: Lessons for telcos from the WannaCry ransomware attack, cerillion blog (2017). http://www.cerillion.com/Blog/May-2017/Lessons-for-Telcos-from-the-WannaCry-attack

  33. Verizon: 2017 Data breach investigations report: Executive summary, industry report

    Google Scholar 

  34. Yang, T., Yang, Y., Qian, K., Lo, D.C.T., Qian, Y., Tao, L.: Automated detection and analysis for Android ransomware. In: Proceedings of the 1st IEEE International Conference on Big Data Security on Cloud (DataSec), pp. 1338–1343. IEEE (2015)

    Google Scholar 

  35. Young, A., Yung, M.: Cryptovirology: Extortion-based security threats and countermeasures. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, pp. 129–140 (1996)

    Google Scholar 

  36. Young, A., Yung, M.: Cryptovirology: The birth, neglect, and explosion of ransomware. Commun. ACM 60(7), 24–26 (2017)

    Article  Google Scholar 

Download references

Acknowledgments

We thank the anonymous reviewers for their comments. The research activities of Jens Grossklags are supported by the German Institute for Trust and Safety on the Internet (DIVSI). Aron Laszka’s work was supported in part by the National Science Foundation (CNS-1238959) and the Air Force Research Laboratory (FA 8750-14-2-0180).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aron Laszka .

Editor information

Editors and Affiliations

Proofs

Proofs

1.1 A.1 Proof of Lemma 1

From Eq. (3), we have that the best-response strategy \(p_i^*\) of organization i is

$$\begin{aligned} p_i^* \in&\mathop {{{\mathrm{argmax}}}}\limits _{p \in \{0, 1\}} \left[ W_j - C_B \cdot b_i - \beta \left( \frac{F_j + (1 - p) \cdot L_j}{b_i} + T_j + p \cdot r \right) \right] \end{aligned}$$
(9)
$$\begin{aligned}&= \mathop {{{\mathrm{argmax}}}}\limits _{p \in \{0, 1\}} p \cdot \left( \frac{L_j}{b_i} - r \right) . \end{aligned}$$
(10)

Clearly, \(p_i^* = 1\) is a best response if and only if \(\frac{L_j}{b_i} - r \ge 0\), and \(p_i^* = 0\) is a best response if and only if \(\frac{L_j}{b_i} - r \le 0\).   \(\square \)

1.2 A.2 Proof of Lemma 2

From Eq. (2), we have that the best-response strategy \(b_i^*\) of organization i is

$$\begin{aligned} b_i^* \in \mathop {{{\mathrm{argmax}}}}\limits _{b_i \in \mathbb {R}_+} \left[ W_j - C_B \cdot b_i - \beta \frac{F_j}{b_i} \right] . \end{aligned}$$
(11)

To find the maximizing \(b_i^*\), we take the first derivative of the payoff, and set it equal to 0:

$$\begin{aligned} -C_B + \beta \frac{F_j}{{b_i^*}^2} = 0 \end{aligned}$$
(12)
$$\begin{aligned} b_i^* = \pm \sqrt{\beta \frac{F_j}{C_B}} , \end{aligned}$$
(13)

Since \(b_i \in \mathbb {R}_+\), the only local optima is \(b_i^* = \sqrt{\beta \frac{F_j}{C_B}}\). Further, the payoff is a concave function of \(b_i\) as the second derivative is negative, which means that this \(b_i^*\) is the global optimum and, hence, a unique best response.    \(\square \)

1.3 A.3 Proof of Lemma 4

The best-response ransom demand \(r^*\) is

$$\begin{aligned} r^* \in&\mathop {{{\mathrm{argmax}}}}\limits _{r \in \mathbb {R}_+} \left[ \sum _j \sum _{i \in G_j} V_j(a_1, a_2) \cdot r \cdot p_i^*(r) \right] - C_A \cdot (a_1 + a_2) - C_D \end{aligned}$$
(14)
$$\begin{aligned}&= \mathop {{{\mathrm{argmax}}}}\limits _{r \in \mathbb {R}_+} \sum _j \sum _{i \in G_j} V_j(a_1, a_2) \cdot r \cdot 1_{\left\{ r \le \frac{L_j}{\hat{b}_j}\right\} } \end{aligned}$$
(15)
$$\begin{aligned}&= \mathop {{{\mathrm{argmax}}}}\limits _{r \in \mathbb {R}_+} \sum _j \left| G_j\right| \cdot V_j(a_1, a_2) \cdot r \cdot 1_{\left\{ r \le \frac{L_j}{\hat{b}_j}\right\} } . \end{aligned}$$
(16)

Clearly, the optimum is attained at either \(\frac{L_1}{\hat{b}_1}\) or \(\frac{L_2}{\hat{b}_2}\). Since we assumed that \(\frac{L_1}{\hat{b}_1} \le \frac{L_2}{\hat{b}_2}\), we have that \(r = \frac{L_1}{\hat{b}_1}\) is a best response if and only if

$$\begin{aligned} \left( \left| G_1\right| V_1(a_1, a_2) + \left| G_2\right| V_2(a_1, a_2)\right) \frac{L_1}{\hat{b}_1} \ge \left| G_2\right| V_2(a_1, a_2) \frac{L_2}{\hat{b}_2} \end{aligned}$$
(17)
$$\begin{aligned} \left| G_1\right| V_1(a_1, a_2) \frac{L_1}{\hat{b}_1} \ge \left| G_2\right| V_2(a_1, a_2) \left( \frac{L_2}{\hat{b}_2} - \frac{L_1}{\hat{b}_1} \right) . \end{aligned}$$
(18)

Further, an analogous condition holds for \(r = \frac{L_2}{\hat{b}_2}\) being a best response, which concludes our proof.    \(\square \)

1.4 A.4 Proof of Lemma 5

Recall that the attacker’s expected payoff is

$$\begin{aligned} {{\mathrm{E}}}\left[ \mathcal {U}_A\right] = \left( \sum _j \sum _{i \in G_j} V_j(a_1, a_2)\cdot p_i \cdot r \right) - C_A \cdot (a_1 + a_2) - C_D \cdot 1_{\left\{ a_1> 0 \text { or } a_2 > 0\right\} } . \end{aligned}$$
(19)

Consider that \(a_1 + a_2 = a_{\text {sum}}\) and r are given, and \(a_{\text {sum}} > 0\). Under these conditions, the attacker’s best strategy is

$$\begin{aligned} a_1^* \in&\mathop {{{\mathrm{argmax}}}}\limits _{a_1 \ge 0} \left( \sum _j \sum _{i \in G_j} V_j(a_1, a_2)\cdot p_i^*(r) \cdot r \right) - C_A \cdot (a_1 + a_2) - C_D \end{aligned}$$
(20)
$$\begin{aligned}&= \mathop {{{\mathrm{argmax}}}}\limits _{a_1 \ge 0} \frac{a_1}{D + a_{\text {sum}}} |G_1| \cdot 1_{\left\{ r \le \frac{L_1}{\hat{b}_1}\right\} } + \frac{a_{\text {sum}} - a_1}{D + a_{\text {sum}}} |G_2| \cdot 1_{\left\{ r \le \frac{L_2}{\hat{b}_2}\right\} }, \end{aligned}$$
(21)

giving the non-negative payoff. The best strategy can be calculated readily.    \(\square \)

1.5 A.5 Proof of Proposition 1

Lemma 5 shows the attacker’s best-response attack effort for fixed effort level, i.e., \(a_{sum}\). In this Lemma, for example, \(a_1^*=0\) and \(a_2^*=a_{sum}\) is the attacker’s best-response effort if \(|G_1| \cdot 1_{\left\{ r \le \frac{L_1}{\hat{b}_1}\right\} } < |G_2| \cdot 1_{\left\{ r \le \frac{L_2}{\hat{b}_2}\right\} }\) and the resulting attacker’s payoff is non-negative. According to Lemma 4, the attacker’s best-response ransom demand is either \(\frac{L_1}{\hat{b}_1}\) or \(\frac{L_2}{\hat{b}_2}\) and without loss of generality, we have assumed that \(\frac{L_1}{\hat{b}_1} \le \frac{L_2}{\hat{b}_2}\).

For this case, the attacker’s payoff is equal to:

$$\begin{aligned} {{\mathrm{E}}}\left[ \mathcal {U}_A\right] = \frac{a_{sum}}{D+a_{sum}} |G_2| \cdot r \cdot 1_{\left\{ r \le \frac{L_2}{\hat{b}_2}\right\} } - C_A \cdot a_{sum} - C_D. \end{aligned}$$
(22)

If the above equation is negative, i.e.,

$$\begin{aligned} r < \frac{ \left( D + a_{sum}\right) \left( C_A \cdot a_{sum} + C_D\right) }{a_{sum} \cdot |G_2| \cdot 1_{\left\{ r \le \frac{L_2}{\hat{b}_2}\right\} }}, \end{aligned}$$

the attacker’s best-response effort is \(a_1^* = a_2^*=0\). To satisfy the above condition, we replace r with \(\frac{L_2}{\hat{b}_2}\), which gives

$$\begin{aligned} \frac{L_2 \cdot a_{sum} \cdot |G_2| \cdot 1_{\left\{ r \le \frac{L_2}{\hat{b}_2}\right\} }}{L_2\left( D + a_{sum}\right) \left( C_A \cdot a_{sum} + C_D\right) } < \hat{b}^*_2. \end{aligned}$$

Further, the defender’s best-response backup strategy when there is no attack, i.e., \(a_1^*=a_2^*=0\) is calculated based on Lemma 2. By inserting the value of \(\hat{b}^*_2\) from Lemma 2, we can readily have the following:

$$\begin{aligned} \frac{L_2 \cdot a_{sum} \cdot |G_2| \cdot 1_{\left\{ r \le \frac{L_2}{\hat{b}_2}\right\} }}{L_2\left( D + a_{sum}\right) \left( C_A \cdot a_{sum} + C_D\right) } < \sqrt{\beta \frac{F_2}{C_B}}. \end{aligned}$$

Another condition can be calculated similarly.    \(\square \)

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Laszka, A., Farhang, S., Grossklags, J. (2017). On the Economics of Ransomware. In: Rass, S., An, B., Kiekintveld, C., Fang, F., Schauer, S. (eds) Decision and Game Theory for Security. GameSec 2017. Lecture Notes in Computer Science(), vol 10575. Springer, Cham. https://doi.org/10.1007/978-3-319-68711-7_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-68711-7_21

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-68710-0

  • Online ISBN: 978-3-319-68711-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics