All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

'Releasing the Hounds?' Disruption of the Ransomware Ecosystem Through Offensive Cyber Operations

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216224%3A14220%2F22%3A00125964" target="_blank" >RIV/00216224:14220/22:00125964 - isvavai.cz</a>

  • Result on the web

    <a href="https://ccdcoe.org/uploads/2022/06/CyCon_2022_book.pdf" target="_blank" >https://ccdcoe.org/uploads/2022/06/CyCon_2022_book.pdf</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.23919/CyCon55549.2022.9811074" target="_blank" >10.23919/CyCon55549.2022.9811074</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    'Releasing the Hounds?' Disruption of the Ransomware Ecosystem Through Offensive Cyber Operations

  • Original language description

    Ransomware groups represent a significant cyber threat to Western states. Most high-end ransomware actors reside in territorial safe-haven jurisdictions and prove to be resistant to traditional law enforcement activities. This has prompted public sector and cybersecurity industry leaders to perceive ransomware as a national security threat requiring a whole-of-government approach, including cyber operations. In this paper, we investigate whether cyber operations or the threat of cyber operations influence the ransomware ecosystem. Subsequently, we assess the vectors of influence and characteristics of past operations that have disrupted the ecosystem. We describe the specifics of the ransomware-as-a-service system and provide three case studies (DarkSide/BlackMatter, REvil, Conti) highly representative of the current ecosystem and the effect cyber operations have on it. Additionally, we present initial observations about the influence of cyber operations on the system, including best practices from cyber operations against non-state groups. We conclude that even professional, highly skilled, and top-performing ransomware groups can be disrupted through cyber operations. In fact, cyber operations can even bypass some limits imposed on law enforcement operations. Even when ransomware groups rebrand or resurface after a hiatus, we suggest their infrastructure (both technical, human, and reputational) will still suffer mid- to long-term disruption. Although cyber operations are unlikely to be a silver bullet, they are an essential tool in the whole-of-government and multinational efforts and may even grow in importance in the next several years.

  • Czech name

  • Czech description

Classification

  • Type

    D - Article in proceedings

  • CEP classification

  • OECD FORD branch

    50501 - Law

Result continuities

  • Project

    <a href="/en/project/EF16_019%2F0000822" target="_blank" >EF16_019/0000822: CyberSecurity, CyberCrime and Critical Information Infrastructures Center of Excellence</a><br>

  • Continuities

    P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)

Others

  • Publication year

    2022

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Article name in the collection

    2022 14th International Conference on Cyber Conflict: Keep Moving

  • ISBN

    9789916978900

  • ISSN

    2325-5366

  • e-ISSN

  • Number of pages

    23

  • Pages from-to

    93-115

  • Publisher name

    NATO CCDCOE Publications

  • Place of publication

    Tallinn

  • Event location

    Tallinn

  • Event date

    May 31, 2022

  • Type of event by nationality

    WRD - Celosvětová akce

  • UT code for WoS article

    000853652000006