Decoding ransomware negotiations: Decoding ransomware negotiations

Michail Georgiou*, Ellen Giebels, Miriam S.D. Oostinga, Remco Spithoven

*Corresponding author for this work

Research output: Contribution to conferencePosterAcademic

Abstract

Over the past few years, there has been a notable increase in ransomware attacks, impacting organizations and their employees and highlighting the need for new perspectives in understanding these incidents. While contemporary ransomware research has largely focused on technical prevention, cybercriminal psychology, and game theory economics, the negotiation process during these incidents has been relatively neglected. This study, utilizing chat logs from 17 actual ransomware cases, aims to identify the potential phases of a ransomware negotiation and to examine the influence strategies employed by both cybercriminals and victim organizations. It specifically investigates deviations from conventional negotiation processes, with a focus on the strategic use of influence tactics and their impact on negotiation outcomes. The anticipated findings are expected to provide comprehensive insights into the dynamics of ransomware negotiations, thereby enhancing academic understanding and informing practical response strategies.
Original languageEnglish
Publication statusPublished - 2024
Event37th Annual Conference of the IACM 2024 - Singapore, Singapore, Singapore
Duration: 23 Jun 202425 Jun 2024
Conference number: 37

Conference

Conference37th Annual Conference of the IACM 2024
Country/TerritorySingapore
CitySingapore
Period23/06/2425/06/24

Keywords

  • ransomware
  • ransomware negotiations
  • influence strategies

Fingerprint

Dive into the research topics of 'Decoding ransomware negotiations: Decoding ransomware negotiations'. Together they form a unique fingerprint.

Cite this