Skip to content
Logo

Cyber Crime Research Share

CONTACT
CONTACT
  • CCRS
  • About
    • CCRS Fellowship
    • CCRS Friends
  • Topics
    • Cybercrime
    • Digital Investigation
    • Digital Forensics
    • Digital Evidence
    • Digital Surveillance
    • Digital Privacy
    • Cyber Security
  • Up2Date
    • KnowHow
    • NetWork
    • Events
    • People of Interest
    • Projects of Interest
    • Periodicals of Interest
  • CCRS Bit
  • CCRS Byte
  • SERBIA
    • RS Cybercrime
    • RS Digital Surveillance
    • RS Cyber Security
    • Report!
  • SR
  • CCRS
  • About
    • CCRS Fellowship
    • CCRS Friends
  • Topics
    • Cybercrime
    • Digital Investigation
    • Digital Forensics
    • Digital Evidence
    • Digital Surveillance
    • Digital Privacy
    • Cyber Security
  • Up2Date
    • KnowHow
    • NetWork
    • Events
    • People of Interest
    • Projects of Interest
    • Periodicals of Interest
  • CCRS Bit
  • CCRS Byte
  • SERBIA
    • RS Cybercrime
    • RS Digital Surveillance
    • RS Cyber Security
    • Report!
  • SR

Ransom War: How Cyber Crime Became a Threat to National Security

Ransom War: How Cyber Crime Became a Threat to National Security

A book by Max Smeets

Sheds light on the inner workings of the groups responsible for deploying ransomware, and the measures governments and businesses can take to combat the threat

This timely book explores the alarming rise of ransomware: malicious software blocking users from their systems or data, until they’ve paid money to regain access or to prevent the release of sensitive information. High-profile British examples of the twenty-first century have targeted national libraries and hospital trusts; in the US, hackers of Pennsylvania’s Lehigh Valley Health Network held patient data hostage—when their demands went unmet, they published topless photographs of women with breast cancer.

The issue presents formidable challenges and costs for businesses, national security and, as the Pennsylvania case showed, individuals—often society’s most vulnerable. But we can watch and learn from cyber extortionists, leaving us better prepared for next time. In 2022, a series of devastating ransomware attacks prompted Costa Rica’s President to declare a national emergency, describing a ‘state of war’. This episode had much to tell us about how these networks arise, operate, organise—and collapse.

Max Smeets’ landmark study demystifies the ransomware playbook, from funding to networking. Through one of the largest ransomware operations on record, he reveals how this challenge has evolved, how it differs in substance and style from traditional cyber/hacking threats, and how to combat it.

Source: Hurst Publishers >>

PrevPreviousNavigating the digital labyrinth: Forensics in the age of AI
NextPersonhood credentials: Artificial intelligence and the value of privacy-preserving tools to distinguish who is real onlineNext

CyberCrime.Research.Share
  • CCRS
  • About
  • Topics
  • Up2Date
  • CCRS Bit
  • CCRS Byte
  • SERBIA
  • SR

Privacy Policy

Be informed

CCRS Bit

CCRS Byte

 

Keep-in-touch

contact@cybercrime.rs

Stay tuned

Follow CCRS

Copyright ©

Made by CCRS with ♥

⚠️  Disclaimer:

Provided for educational and informative purposes only