100% (1)
Pages:
5 pages/≈1375 words
Sources:
3
Style:
APA
Subject:
Management
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 21.6
Topic:

Role of Cryptocurrencies in the Growth of Cyber-Extortion

Essay Instructions:

In Assignment 2, you are required write a paper on the following topic:







The roles of cryptocurrencies such as bitcoin in the growth of cyber-extortion involving ransomware.







Your paper is expected to cover the following:







Recent growth in ransomware and cyber-extortion with some examples

Why cyber-extortionists demand that ransom be paid by cryptocurrencies such as bitcoin

What types of victims are likely to comply with cyber-extortionists demand to pay ransom with bitcoin?

Assume that you are the CEO of a bank. All of your bank’s files have been encrypted by cybercriminals. You received an email from the cybercriminals that they will decrypt the files only if you pay $30,000 by bitcoins. How would you respond? Why





Your analysis is expected to be about 1,400 words in length excluding the references. Please cite all the sources of your information.

Essay Sample Content Preview:

Role of Cryptocurrencies in the Growth of Cyber-Extortion
Student’s Name
Institutional Affiliation
Role of Cryptocurrencies in the Growth of Cyber-Extortion
Introduction
Whenever hackers manage to install malicious software on the servers of organizations and other institutions worldwide, they demand ransom, threatening to decode and share the information if the owners fail to meet their demands. Sometimes the companies hire security researchers who realize a fix that enables the owners to decrypt their computers without submitting to the demands by the hackers. However, a majority of organizations and individuals are forced to pay the ransom to free up their data. According to the report by the FBI in 2016, a total of $1 billion was paid as ransom to extortionists (Kshetri, 2017). Before the existence of cryptocurrencies, the money was transferred using services like Western Union. Such means of transfer were easily traced. However, the introduction of cryptocurrencies like Bitcoin has created an anonymity and a quick process of transfer.
Ransomware is a group of malware that denies the user access to their computer or servers. Infected third party sites or emails are the most common means of delivering the malware to computers. To regain the data, users need to pay a ransom. Bitcoin is the most popular cryptocurrency and for this reason, extortionists demand payments in the currency. Several attacks have been recorded in which the hackers demanded payment in bitcoins. An example is the Petya ransomware, who demand a fee of $300 for every computer before giving the owners a code to decrypt their data (Kshetri, 2017).
Growth in Ransomware and Cyber-Extortion
In 2016, the number of ransomware attacks significantly increased due to the sophistication of the malware (Weisbaum, 2017). The sophistication has encouraged most criminals to switch to ransomware since they can purchase ransomware that is readily available from highly professional hackers. The proliferation of cyber extortion tools has greatly decreased the chances of coming up with barriers to blur the ability of security researchers to assess the malware in time. As such, individuals can launch attacks that are highly sophisticated with basic computer skills.
The potential growth of ransomware has seen many companies fall to the attacks worldwide. In 2017, Shadow Brokers leaked a gigabyte worth of the weapon software exploits of the U.S National Security Agency and made the tools freely available to the online community (Yamashita, 2017). Thereafter, WannaCry launched an attack on government agencies, hospitals, and companies as the world watched in dismay. Despite their low demand of $300 in bitcoins for every computer infected, the damages done to these companies was far much worse than previous attacks. The malware affected 300,000 firms in 150 countries (Kharpal, 2018).
Majority of these attackers do so with the intent of gaining money, satisfying their ego, or for revenge and political reasons. The existence of marketplaces in the dark web and hacking tools among others has also greatly contributed to the growing number of attacks. Politically motivated attacks have also been witnessed in countries such as Europe, in which case, the Russian government launched the NotPetya attack that affected a large number of companies as a means of damaging the Ukrainian critical infrastructure (Yamashita, 2017). Owing to the interconnected global economy and the existence of the dark web and cryptocurrencies, the occurrence of cyber extortion is bound to be on the rise.
Reasons for Demanding Payments in Crypto-Currencies
Cryptocurrencies are digital currencies that use cryptography as a means of eliminating counterfeiting (Baker, 2017). Cryptocurrencies such as Bitcoin enable fast transactions that are more secure and anonymous compared to other regulated transactions. Its lack of regulation has made it common among users since it is cheaper and transferable across the globe (Baker, 2017). Having been commonly used in the black market to illegally purchase goods such as illegal firearms and drugs, cybercriminals have also adopted the currency in ransomware. The lack of traceability is the most significant reason why cybercriminals use cryptocurrencies (Baker, 2017). It is difficult to trace transactions and link them to the actual individual. This anonymity has made it harder for law enforcers to identify the attackers. Although the currency can be traced once the attacker transfers it to a bank account, most criminals prefer to convert the bitcoin to another digital currency as a means of obscuring the trail of the money. Moreover, new generation currencies such as Monero offer an even greater level of anonymity, thus encouraging hackers to comfortably carry out their attacks and transactions.
Victims of Cyber-Extortionists
Typically, every company or individual is likely to face a ransomware attack. Depending on the attractiveness of data and its importance, not every individual or organization can be willing to pay the ransom. Academic organizations have been ...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:
Sign In
Not register? Register Now!