Abstract
While recognized as a theoretical and practical concept for over 20 years, only now ransomware has taken centerstage as one of the most prevalent cybercrimes. Various reports demonstrate the enormous burden placed on companies, which have to grapple with the ongoing attack waves. At the same time, our strategic understanding of the threat and the adversarial interaction between organizations and cybercriminals perpetrating ransomware attacks is lacking.
In this paper, we develop, to the best of our knowledge, the first game-theoretic model of the ransomware ecosystem. Our model captures a multi-stage scenario involving organizations from different industry sectors facing a sophisticated ransomware attacker. We place particular emphasis on the decision of companies to invest in backup technologies as part of a contingency plan, and the economic incentives to pay a ransom if impacted by an attack. We further study to which degree comprehensive industry-wide backup investments can serve as a deterrent for ongoing attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
Since we interpret effort \(b_i\) primarily as the frequency of backups, the fraction \(\frac{1}{b_i}\) is proportional to the expected time since the last backup. Consequently, we assume that data losses are inversely proportional to \(b_i\). Note that alternative interpretations, such as assuming \(b_i\) to be the level of sophistication of backups (e.g., air-gapping), which determines the probability that the backups remain uncompromised, also imply a similar relationship.
- 2.
We are unaware of any behavioral study that specifically investigates the impact of the present bias behavioral discount factor on backup decisions, but industry experts argue strongly for its relevance. For example, in the context of the 2017 WannaCry ransomware attacks a commentary about backups stated: “This may be stating the obvious, but it’s still amazing to know the sheer number of companies that keep procrastinating over this important task [32].”
- 3.
The reasoning is as follows: “When electronic protected health information (ePHI) is encrypted as the result of a ransomware attack, a breach has occurred because the ePHI encrypted by the ransomware was acquired (i.e., unauthorized individuals have taken possession or control of the information), and thus is a “disclosure” not permitted under the HIPAA Privacy Rule [30]”.
References
Acquisti, A., Grossklags, J.: What can behavioral economics teach us about privacy? In: Digital Privacy: Theory, Technologies, and Practices, pp. 363–379. Auerbach Publications (2007)
Andronio, N., Zanero, S., Maggi, F.: HelDroid: Dissecting and detecting mobile ransomware. In: Bos, H., Monrose, F., Blanc, G. (eds.) RAID 2015. LNCS, vol. 9404, pp. 382–404. Springer, Cham (2015). doi:10.1007/978-3-319-26362-5_18
Backblaze: Backup awareness survey, our 10th year, industry report. https://www.backblaze.com/blog/backup-awareness-survey/
Baddeley, M.: Information security: Lessons from behavioural economics. In: Workshop on the Economics of Information Security (WEIS) (2011)
Becker, G.: Crime and punishment: an economic approach. J. Polit. Econ. 76(2), 169–217 (1968)
Brandt, P., George, J., Sandler, T.: Why concessions should not be made to terrorist kidnappers. Eur. J. Polit. Econ. 44, 41–52 (2016)
Bruskin Research: Nearly one in four computer users have lost content to blackouts, viruses and hackers according to new national survey, survey conducted for Iomega Corporation (2001)
Fink, A., Pingle, M.: Kidnap insurance and its impact on kidnapping outcomes. Public Choice 160(3), 481–499 (2014)
Finkle, J.: Ransomware: Extortionist hackers borrow customer-service tactics (2016). http://www.reuters.com/article/us-usa-cyber-ransomware-idUSKCN0X917X
Fultz, N., Grossklags, J.: Blue versus Red: towards a model of distributed security attacks. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 167–183. Springer, Heidelberg (2009). doi:10.1007/978-3-642-03549-4_10
Gazet, A.: Comparative analysis of various ransomware virii. J. Comput. Virol. 6(1), 77–90 (2010)
Grossklags, J., Christin, N., Chuang, J.: Secure or insure?: A game-theoretic analysis of information security games. In: Proceedings of the 17th International World Wide Web Conference, pp. 209–218 (2008)
Grossklags, J., Barradale, N.J.: Social status and the demand for security and privacy. In: De Cristofaro, E., Murdoch, S.J. (eds.) PETS 2014. LNCS, vol. 8555, pp. 83–101. Springer, Cham (2014). doi:10.1007/978-3-319-08506-7_5
IBM: IBM study: Businesses more likely to pay ransomware than consumers, industry report (2016). http://www-03.ibm.com/press/us/en/pressrelease/51230.wss
Kabooza: Global backup survey: About backup habits, risk factors, worries and data loss of home PCs, January 2009. http://www.kabooza.com/globalsurvey.html
Kharraz, A., Arshad, S., Mulliner, C., Robertson, W., Kirda, E.: UNVEIL: A large-scale, automated approach to detecting ransomware. In: Proceedings of the 25th USENIX Security Symposium (USENIX Security), pp. 757–772 (2016)
Kharraz, A., Robertson, W., Balzarotti, D., Bilge, L., Kirda, E.: Cutting the Gordian Knot: A look under the hood of ransomware attacks. In: Almgren, M., Gulisano, V., Maggi, F. (eds.) DIMVA 2015. LNCS, vol. 9148, pp. 3–24. Springer, Cham (2015). doi:10.1007/978-3-319-20550-2_1
KnowBe4: The 2017 endpoint protection ransomware effectiveness report, industry report (2017). https://www.knowbe4.com/hubfs/Endpoint%20Protection%20Ransomware%20Effectiveness%20Report.pdf
Laszka, A., Felegyhazi, M., Buttyan, L.: A survey of interdependent information security games. ACM Comput. Surv. 47(2), 23:1–23:38 (2014)
Laszka, A., Farhang, S., Grossklags, J.: On the economics of ransomware. CoRR abs/1707.06247 (2017). http://arxiv.org/abs/1707.06247
Liao, K., Zhao, Z., Doupé, A., Ahn, G.J.: Behind closed doors: Measurement and analysis of CryptoLocker ransoms in Bitcoin. In: Proceedings of the 2016 APWG Symposium on Electronic Crime Research (eCrime) (2016)
Luo, X., Liao, Q.: Awareness education as the key to ransomware prevention. Inf. Syst. Secur. 16(4), 195–202 (2007)
Luo, X., Liao, Q.: Ransomware: A new cyber hijacking threat to enterprises. In: Gupta, J., Sharma, S. (eds.) Handbook of Research on Information Security and Assurance, pp. 1–6. IGI Global (2009)
O’Donoghue, T., Rabin, M.: Doing it now or later. Am. Econ. Rev. 89(1), 103–124 (1999)
O’Gorman, G., McDonald, G.: Ransomware: A growing menace. Symantec Security Response (2012)
Proofpoint: Threat summary: Q4 2016 & year in review, industry report. https://www.proofpoint.com/sites/default/files/proofpoint_q4_threat_report-final-cm.pdf
Scaife, N., Carter, H., Traynor, P., Butler, K.: Cryptolock (and drop it): Stopping ransomware attacks on user data. In: Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS), pp. 303–312 (2016)
Schechter, S.E., Smith, M.D.: How much security is enough to stop a thief? In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 122–137. Springer, Heidelberg (2003). doi:10.1007/978-3-540-45126-6_9
Simon, R.: Mirai, BrickerBot, Hajime attack a common IoT weakness (2017). https://securingtomorrow.mcafee.com/mcafee-labs/mirai-brickerbot-hajime-attack-common-iot-weakness/
U.S. Department of Health & Human Service: Fact sheet: Ransomware and HIPAA (2016). https://www.hhs.gov/sites/default/files/RansomwareFactSheet.pdf
Varian, H.: System reliability and free riding. In: Camp, L., Lewis, S. (eds.) Economics of Information Security (Advances in Information Security), vol. 12, pp. 1–15. Kluwer Academic Publishers, Dordrecht (2004)
Venkat, S.: Lessons for telcos from the WannaCry ransomware attack, cerillion blog (2017). http://www.cerillion.com/Blog/May-2017/Lessons-for-Telcos-from-the-WannaCry-attack
Verizon: 2017 Data breach investigations report: Executive summary, industry report
Yang, T., Yang, Y., Qian, K., Lo, D.C.T., Qian, Y., Tao, L.: Automated detection and analysis for Android ransomware. In: Proceedings of the 1st IEEE International Conference on Big Data Security on Cloud (DataSec), pp. 1338–1343. IEEE (2015)
Young, A., Yung, M.: Cryptovirology: Extortion-based security threats and countermeasures. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, pp. 129–140 (1996)
Young, A., Yung, M.: Cryptovirology: The birth, neglect, and explosion of ransomware. Commun. ACM 60(7), 24–26 (2017)
Acknowledgments
We thank the anonymous reviewers for their comments. The research activities of Jens Grossklags are supported by the German Institute for Trust and Safety on the Internet (DIVSI). Aron Laszka’s work was supported in part by the National Science Foundation (CNS-1238959) and the Air Force Research Laboratory (FA 8750-14-2-0180).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Proofs
Proofs
1.1 A.1 Proof of Lemma 1
From Eq. (3), we have that the best-response strategy \(p_i^*\) of organization i is
Clearly, \(p_i^* = 1\) is a best response if and only if \(\frac{L_j}{b_i} - r \ge 0\), and \(p_i^* = 0\) is a best response if and only if \(\frac{L_j}{b_i} - r \le 0\). \(\square \)
1.2 A.2 Proof of Lemma 2
From Eq. (2), we have that the best-response strategy \(b_i^*\) of organization i is
To find the maximizing \(b_i^*\), we take the first derivative of the payoff, and set it equal to 0:
Since \(b_i \in \mathbb {R}_+\), the only local optima is \(b_i^* = \sqrt{\beta \frac{F_j}{C_B}}\). Further, the payoff is a concave function of \(b_i\) as the second derivative is negative, which means that this \(b_i^*\) is the global optimum and, hence, a unique best response. \(\square \)
1.3 A.3 Proof of Lemma 4
The best-response ransom demand \(r^*\) is
Clearly, the optimum is attained at either \(\frac{L_1}{\hat{b}_1}\) or \(\frac{L_2}{\hat{b}_2}\). Since we assumed that \(\frac{L_1}{\hat{b}_1} \le \frac{L_2}{\hat{b}_2}\), we have that \(r = \frac{L_1}{\hat{b}_1}\) is a best response if and only if
Further, an analogous condition holds for \(r = \frac{L_2}{\hat{b}_2}\) being a best response, which concludes our proof. \(\square \)
1.4 A.4 Proof of Lemma 5
Recall that the attacker’s expected payoff is
Consider that \(a_1 + a_2 = a_{\text {sum}}\) and r are given, and \(a_{\text {sum}} > 0\). Under these conditions, the attacker’s best strategy is
giving the non-negative payoff. The best strategy can be calculated readily. \(\square \)
1.5 A.5 Proof of Proposition 1
Lemma 5 shows the attacker’s best-response attack effort for fixed effort level, i.e., \(a_{sum}\). In this Lemma, for example, \(a_1^*=0\) and \(a_2^*=a_{sum}\) is the attacker’s best-response effort if \(|G_1| \cdot 1_{\left\{ r \le \frac{L_1}{\hat{b}_1}\right\} } < |G_2| \cdot 1_{\left\{ r \le \frac{L_2}{\hat{b}_2}\right\} }\) and the resulting attacker’s payoff is non-negative. According to Lemma 4, the attacker’s best-response ransom demand is either \(\frac{L_1}{\hat{b}_1}\) or \(\frac{L_2}{\hat{b}_2}\) and without loss of generality, we have assumed that \(\frac{L_1}{\hat{b}_1} \le \frac{L_2}{\hat{b}_2}\).
For this case, the attacker’s payoff is equal to:
If the above equation is negative, i.e.,
the attacker’s best-response effort is \(a_1^* = a_2^*=0\). To satisfy the above condition, we replace r with \(\frac{L_2}{\hat{b}_2}\), which gives
Further, the defender’s best-response backup strategy when there is no attack, i.e., \(a_1^*=a_2^*=0\) is calculated based on Lemma 2. By inserting the value of \(\hat{b}^*_2\) from Lemma 2, we can readily have the following:
Another condition can be calculated similarly. \(\square \)
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Laszka, A., Farhang, S., Grossklags, J. (2017). On the Economics of Ransomware. In: Rass, S., An, B., Kiekintveld, C., Fang, F., Schauer, S. (eds) Decision and Game Theory for Security. GameSec 2017. Lecture Notes in Computer Science(), vol 10575. Springer, Cham. https://doi.org/10.1007/978-3-319-68711-7_21
Download citation
DOI: https://doi.org/10.1007/978-3-319-68711-7_21
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-68710-0
Online ISBN: 978-3-319-68711-7
eBook Packages: Computer ScienceComputer Science (R0)