CFP last date
20 August 2025
Call for Paper
September Edition
IJCA solicits high quality original research papers for the upcoming September edition of the journal. The last date of research paper submission is 20 August 2025

Submit your paper
Know more
Random Articles
Reseach Article

Ransomware Rewired: The Evolution of Extortion in the Age of Encryption

by Pavan Subhash Chandrabose Nara, Suhair Amer
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 187 - Number 26
Year of Publication: 2025
Authors: Pavan Subhash Chandrabose Nara, Suhair Amer
10.5120/ijca2025925452

Pavan Subhash Chandrabose Nara, Suhair Amer . Ransomware Rewired: The Evolution of Extortion in the Age of Encryption. International Journal of Computer Applications. 187, 26 ( Jul 2025), 33-37. DOI=10.5120/ijca2025925452

@article{ 10.5120/ijca2025925452,
author = { Pavan Subhash Chandrabose Nara, Suhair Amer },
title = { Ransomware Rewired: The Evolution of Extortion in the Age of Encryption },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2025 },
volume = { 187 },
number = { 26 },
month = { Jul },
year = { 2025 },
issn = { 0975-8887 },
pages = { 33-37 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume187/number26/ransomware-rewired-the-evolution-of-extortion-in-the-age-of-encryption/ },
doi = { 10.5120/ijca2025925452 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2025-07-31T02:40:11.769024+05:30
%A Pavan Subhash Chandrabose Nara
%A Suhair Amer
%T Ransomware Rewired: The Evolution of Extortion in the Age of Encryption
%J International Journal of Computer Applications
%@ 0975-8887
%V 187
%N 26
%P 33-37
%D 2025
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper delves into the multifaceted nature of ransomware, a type of malware that restricts user access to their digital devices and/or data, demanding payment for its release. The study begins by tracing the evolution of ransomware from its rudimentary origins, exemplified by the AIDS Trojan in 1989, to the sophisticated cyber extortion schemes of the present day. It highlights the financial motivations behind ransomware attacks, distinguishing them from other forms of malware, and categorizes the various types of ransomwares, such as crypto malware, lockers, scareware, and doxware, each with its own modus operandi. The paper also analyzes the ethical quandaries that arise from ransomware attacks, examining the motivations and targets of cybercriminals, the varying responses of victimized entities, and the broader ethical implications of paying ransoms. Furthermore, it presents a study on the behavioral changes and risk perceptions of victims’ post-attack, shedding light on the psychological and practical aftermath of ransomware incidents. The paper concludes by underscoring the escalating threat of ransomware, advocating for enhanced protective measures, and stressing the importance of legal and ethical frameworks to address this complex cybercrime.

References
  1. T. Jacobson C. S. Kruse, B. Frederick and D. K. Monticone. Cyberse- curity in healthcare: A systematic review of modern threats and trends. Technical report, Texas State University, San Marcos, August 2017.
  2. Joseph Bonneau Camelia Simoiu, Christopher Gates and Sharad Goel. “i was told to buy a software or lose my computer. i ignored it”: A study of ransomware. In USENIX Symposium on Usable Privacy and Security (SOUPS), Santa Clara, CA, USA, August 11–13 2019.
  3. European Commission. Guidance note - research involving dual-use items. Technical report, 2016.
  4. Mauro Conti, Tooska Dargahi, and Ali Dehghantanha. Cyber Threat Intelligence: Challenges and Opportunities, page 1–6. Springer Inter- national Publishing, Cham, Switzerland, 2018.
  5. J. Davis. Allscripts hit by ransomware, knocking some services offline, Jan 2018.
  6. J. Davis. Ransomware attack on fetal diagnostic lab breaches 40,800 patient records, Sept 2018.
  7. J. Davis. Ransomware attack on hancock health drives providers to pen and paper, Jan 2018.
  8. Jessica Davis. Ransomware, malware attack breaches 45,000 patient records. Healthcare IT News, July 2018. Accessed: 07 April 2025.
  9. C. Empey. The essential guide to ransomware and how to protect yourself, Feb 2018. Avast Blog, Avast Software S.r.o.
  10. FBI. Ransomware prevention and response for cisos, July 2016. US Department of Justice.
  11. J. Fruhlinger. What is wannacry ransomware, how does it infect, and who was responsible?, 2018. ProQuest.
  12. Josh Fruhlinger. Wannacry explained: A perfect ransomware storm. CSO Online, August 2022.
  13. S. Ganorkar and K. Kandasamy. Understanding and defending crypto- ransomware. ARPN Journal of Engineering and Applied Sciences, 12:3920–3925, 2017.
  14. Ziya Alper Genc¸, Gabriele Lenzini, and Daniele Sgandurra. On deception-based protection against cryptographic ransomware. In Roberto Perdisci, Cle´mentine Maurice, Giorgio Giacinto, and Magnus Almgren, editors, Detection of Intrusions and Malware, and Vulnera- bility Assessment, page 219–239, Cham, Switzerland, 2019. Springer International Publishing.
  15. C. Graham. Nhs cyber attack: Everything you need to know about ‘biggest ransomware’ offensive in history, May 2017. The Telegraph.
  16. A. Hammill. The rise and wrath of ransomware and what it means for society. Diss., Utica College, 2017.
  17. N. Hassan. Ransomware attack on medstar: Ethical position statement. SEISENSE Journal of Management, 1(4):29–31, 2018. Zenodo.
  18. Keith Jarvis. Cryptolocker ransomware, December 2013.
  19. B. Krebs. Cloud hosting provider dataresolution.net battling christmas eve ransomware attack, 2019.
  20. V. Kremez and T. Farral. How ransomware has become an ’ethical’ dilemma in the eastern european underground, 2016.
  21. L. Lambeck. Bridgeport schools computer network hit by ransomware attack, Jan 2019.
  22. O. Mamedov, F. Sinitsyn, and A. Ivanov. Bad rabbit ransomware, October 2017.
  23. J. Martin. Who is a target for ransomware attacks?, July 2017.
  24. L. Matthews. Ransomware attack disrupts emergency services at ohio hospital, 2018.
  25. Council of European Union. Council regulation (eu) no 428/2009, 2009.
  26. Gavin O’Gorman and Geoff McDonald. Ransomware: A growing menace. Technical report, Symantec Security Response, 2012.
  27. T. Nafis P. Kulkarni and S. Biswas. Preventive measures and incident response for locky ransomware. International Journal of Advanced Research in Computer Science, 8(5), 2017. ProQuest.
  28. Joseph Onibokun Lynne Coventry Jurjen Jansen Paul Van Schaik, Debora Jeske and Petko Kusev. Risk perceptions of cyber-security and precautionary behaviour. Computers in Human Behavior, 75:547–559, 2017.
  29. F. Rashid. Cerber ransomware targets enterprises via office 365, 2016. ProQuest.
  30. R. Richardson and M. North. Ransomware: Evolution, mitigation and prevention. International Management Review, 13(1):10–21, 2017.
  31. R. Upadhyaya and A. Jain. Cyber ethics and cyber crime: a deep dwelved study into legality, ransomware, underground web and bitcoin wallet. In 2016 International Conference on Computing, Communication and Automation (ICCCA), page 143–148. IEEE, April 2016.
  32. Mayur Rele, John Samuel, Dipti Patil, Udaya Krishnan, Exploring Ransomware Detection Based on Artificial Intelligence and Machine Learning, Procedia Computer Science, Volume 252, 2025, Pages 548-556, ISSN 1877-0509, https://doi.org/10.1016/j.procs.2025.01.014. (https://www.sciencedirect.com/science/article/pii/S1877050925000146)
  33. Muna Al-Hawawreh, Mamoun Alazab, Mohamed Amine Ferrag, M. Shamim Hossain, Securing the Industrial Internet of Things against ransomware attacks: A comprehensive analysis of the emerging threat landscape and detection mechanisms, Journal of Network and Computer Applications, Volume 223, 2024, 103809, ISSN 1084-8045, https://doi.org/10.1016/j.jnca.2023.103809. (https://www.sciencedirect.com/science/article/pii/S108480452300228X)
  34. Anna Cartwright and Edward Cartwright. 2023. The Economics of Ransomware Attacks on Integrated Supply Chain Networks. Digital Threats 4, 4, Article 56 (December 2023), 14 pages. https://doi.org/10.1145/3579647
Index Terms

Computer Science
Information Sciences

Keywords

Ransomware Cyber Ethics Cyber Security Malware Data Encryption Ransom Payment Ethical Dilem- mas Post-Attack Behavior Risk Perception Cybercrime Data Recovery Prevention Strategies