Ransomware: A Cyber Extortion

  • Miss. Harshada U Salvi University of Pune
  • Mr. Ravindra V Kerkar
Keywords: Ransomware, Extortion, Malware, Bitcoins, Cryptovirus, Cryptotrojan, Cryptoworm, CryptoLocker, WinLocker, Cryptoviral extortion


Life as we know it today would be hampered without computers. They controls just about everything from basic communication, finances and even medical science. As internet technologies are advancing more rapidly, more businesses and individuals are storing sensitive data electronically. Internet has become the hunting ground for criminals to make profit, cause disturbance and bring down organizations and governments. Ransomware is the latest trend that criminals are using for extorting cash from the victims. It is malware that denies you access to your system until you pay ransom


[1] Sophos.com, "Information on malware known as Ransomware", 2015. [Online]. Available: https://www.sophos.com/enus/support/knowledgebase/119006.aspx. [2]J. Bates, "Trojan Horse: AIDS Information Introductory Diskette Version 2.0", Virus Bulletin Ltd, England., 1990. [3]M. Kassner, "Ransomware: Extortion via the Internet - TechRepublic", TechRepublic, 2010. [Online]. Available: http://www.techrepublic.com/blog/it-security/ransomware-extortion-viathe-internet/. [4]A. Young and M. Yung, "Cryptovirology: extortion-based security threats and countermeasures", in IEEE Symposium on Security and Privacy, Oakland, CA, 1996, pp. 129 - 140. [5]J. Leyden, "Ransomware getting harder to break", Theregister.co.uk, 2006. [Online]. Available: http://www.theregister.co.uk/2006/07/24/ransomware/. [6]K. Laffan, "A Brief History of Ransomware", Varonis: The Inside Out Security Blog, 2015. [7]K. Savage, P. Coogan and H. Lau, "The evolution of ransomware", Symantec Security Response Publications, 2015. [8]J. Zorabedian, "Anatomy of a ransomware attack: CryptoLocker, CryptoWall, and how to stay safe (Infographic)", Sophos, 2015. [9] Symantec, "Rise in Targeted Attacks Aimed At Indian Businesses Dealing With Critical Infrastructure", 2015. [10]"Internet Security Threat Report, Volume 20", Security Response Publications, 2015. [11]A. Chauhan, "Notorious computer virus attacks users’ files", The Times of India, 2016. [12]S. Shekhar, "Delhi businessman hacked, asked to pay $500", Mail Today, 2015. [13]S. Das, "Indian Banks & Big Industry Targeted in Ransomware Racket Demanding Bitcoin - CCN: Financial Bitcoin & Cryptocurrency News", CCN: Financial Bitcoin & Cryptocurrency News, 2016. [Online]. Available: https://www.cryptocoinsnews.com/indian-banks-big-industry-targetedin-ransomware-racket-demanding-bitcoin/. [14]"Mobile Internet - Statistics & Facts", 2015. [Online]. Available: http://www.statista.com/topics/779/mobile-internet/. [15]L. Stefanko, "Aggressive Android ransomware spreading in the USA", Welivesecurity.com, 2016. [Online]. Available:http://www.welivesecurity.com/2015/09/10/aggressive-androidransomware-spreading-in-the-usa/. [16]R. Dela Paz, "Encryptor RaaS: Yet another new Ransomware-as-aService on the Block", Fortinet Blog, 2015. [17] Digitalindia.gov.in, "Vision and Vision Areas | Digital India Programme". [Online]. Available: http://www.digitalindia.gov.in/content/vision-and-vision-areas
How to Cite
Salvi, M. H., & Kerkar, M. R. (2017). Ransomware: A Cyber Extortion. Asian Journal For Convergence In Technology (AJCT), 2(2). Retrieved from http://asianssr.org/index.php/ajct/article/view/55