skip to main content
research-article
Free access

The worsening state of ransomware

Published: 22 March 2021 Publication History

Abstract

Sophisticated, dangerous ransomware is the new normal … and there is no simple fix.

References

[1]
The State of Ransomware in the US: Report and Statistics 2019, Emisoft, https://bit.ly/36qYkbf
[2]
The State of Ransomware 2020, Sophos, https://bit.ly/3dtlIbb
[4]
New Jersey hospital paid ransomware gang $670K to prevent data leak, BleepingComputer, https://bit.ly/3jXOWBj
[5]
The new target that enables ransomware hackers to paralyze dozens of towns and businesses at once, GCN, https://gcn.com/articles/2019/09/12/ransomware-msp.aspx
[6]
"Ransomware: How an attack works," Sophos, https://support.sophos.com/support/s/article/KB-000036277?language=en_US
[8]
Color by numbers: Inside a Dharma ransomware-as-a-service attack, Sophos News, https://bit.ly/379rkGd
[10]
The realities of ransomware: The evasion arms race, Sophos News, https://bit.ly/2Il88v0
[11]
The Dark Market Report: The New Economy, Armor, https://www.armor.com/resources/the-dark-market-report/
[12]
The State of Ransomware 2020, Sophos, https://bit.ly/3dtlIbb
[14]
Ransomware attacks are increasing at an unprecedented rate --- and the US is now begging people not to pay ransoms, Business Insider, https://bit.ly/3k59Oqh
[15]
Microsoft takes down massive hacking operation that could have affected the election, CNN Business, https://cnn.it/3dtLXOu

Cited By

View all
  • (2024)Combating the Escalating Threat of Ransomware Multi-Pronged Approach for Secure Organizations2024 International Conference on Artificial Intelligence, Computer, Data Sciences and Applications (ACDSA)10.1109/ACDSA59508.2024.10467453(1-5)Online publication date: 1-Feb-2024
  • (2024)Ranflood: A mitigation tool based on the principles of data flooding against ransomwareSoftwareX10.1016/j.softx.2023.10160525(101605)Online publication date: Feb-2024
  • (2024)Deception in double extortion ransomware attacks: An analysis of profitability and credibilityComputers & Security10.1016/j.cose.2023.103670138(103670)Online publication date: Mar-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 64, Issue 4
April 2021
164 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/3458337
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 March 2021
Published in CACM Volume 64, Issue 4

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article
  • Popular
  • Pre-selected

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)201
  • Downloads (Last 6 weeks)19
Reflects downloads up to 14 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Combating the Escalating Threat of Ransomware Multi-Pronged Approach for Secure Organizations2024 International Conference on Artificial Intelligence, Computer, Data Sciences and Applications (ACDSA)10.1109/ACDSA59508.2024.10467453(1-5)Online publication date: 1-Feb-2024
  • (2024)Ranflood: A mitigation tool based on the principles of data flooding against ransomwareSoftwareX10.1016/j.softx.2023.10160525(101605)Online publication date: Feb-2024
  • (2024)Deception in double extortion ransomware attacks: An analysis of profitability and credibilityComputers & Security10.1016/j.cose.2023.103670138(103670)Online publication date: Mar-2024
  • (2023)Data Flooding against Ransomware: Concepts and ImplementationsComputers & Security10.1016/j.cose.2023.103295131(103295)Online publication date: Aug-2023
  • (2022)An Intelligent System to Detect Advanced Persistent Threats in Industrial Internet of Things (I-IoT)Electronics10.3390/electronics1105074211:5(742)Online publication date: 28-Feb-2022
  • (2022)Reducing False Negatives in Ransomware Detection: A Critical Evaluation of Machine Learning AlgorithmsApplied Sciences10.3390/app12241294112:24(12941)Online publication date: 16-Dec-2022
  • (2022)Insecure Software on a Fragmenting Internet2022 Cyber Research Conference - Ireland (Cyber-RCI)10.1109/Cyber-RCI55324.2022.10032675(1-9)Online publication date: 25-Apr-2022
  • (2022)R-Sentry: Deception based ransomware detection using file access patternsComputers and Electrical Engineering10.1016/j.compeleceng.2022.108346103(108346)Online publication date: Oct-2022
  • (2021)A design for a secure network of networks using a hardware and software co-engineering architectureProceedings of the SIGCOMM '21 Poster and Demo Sessions10.1145/3472716.3472849(65-67)Online publication date: 23-Aug-2021
  • (2021)Cyberattacks as “state of exception” reconceptualizing cybersecurity from prevention to surviving and accommodatingJournal of Information, Communication and Ethics in Society10.1108/JICES-01-2021-0015ahead-of-print:ahead-of-printOnline publication date: 11-Oct-2021

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Digital Edition

View this article in digital edition.

Digital Edition

Magazine Site

View this article on the magazine site (external)

Magazine Site

Login options

Full Access

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media