Show simple item record

dc.contributor.authorMacRae, John
dc.contributor.authorFranqueira, Virginia N. L.
dc.date.accessioned2018-01-22T16:35:58Z
dc.date.available2018-01-22T16:35:58Z
dc.date.issued2018-01-06
dc.identifier.citationMacRae, J. and Franqueira, V. N. L. (2018) 'On Locky ransomware, Al Capone and Brexit', In: Matoušek P., Schmiedecker M. (eds) Digital Forensics and Cyber Crime. ICDF2C 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 216. Springer, Chamen
dc.identifier.isbn9783319736976
dc.identifier.doi10.1007/978-3-319-73697-6_3
dc.identifier.urihttp://hdl.handle.net/10545/622073
dc.description.abstractThe highly crafted lines of code which constitute the Locky cryptolocker ransomware are there to see in plain text in an infected machine. Yet, this forensic evidence does not lead investigators to the identity of the extortionists nor to the destination of the ransom payments. Perpetrators of this ransomware remain unknown and unchallenged and so the ransomware cyber crimewave gathers pace. This paper examines what Locky is, how it works, and the mechanics of this malware to understand how ransom payments are made. The financial impact of Locky is found to be substantial. The paper describes methods for “following the money” to assess how effectively such a digital forensic trail can assist ransomware investigators. The legal instruments that are being established by the authorities as they attempt to shut down ransomware attacks and secure prosecutions are evaluated. The technical difficulty of following the money coupled with a lack of registration and disclosure legislation mean that investigators of this cybercrime are struggling to secure prosecutions and halt Locky.
dc.description.sponsorshipN/Aen
dc.language.isoenen
dc.publisherSpringeren
dc.relation.urlhttps://link.springer.com/chapter/10.1007/978-3-319-73697-6_3en
dc.subjectLockyen
dc.subjectRansomwareen
dc.subjectCryptolockeren
dc.subjectBitcoinen
dc.subjectBrexiten
dc.subjectDigital forensicsen
dc.subjectMoney launderingen
dc.titleOn Locky ransomware, Al Capone and Brexiten
dc.typeBook chapteren
dc.contributor.departmentUlster Universityen
dc.contributor.departmentUniversity of Derbyen
html.description.abstractThe highly crafted lines of code which constitute the Locky cryptolocker ransomware are there to see in plain text in an infected machine. Yet, this forensic evidence does not lead investigators to the identity of the extortionists nor to the destination of the ransom payments. Perpetrators of this ransomware remain unknown and unchallenged and so the ransomware cyber crimewave gathers pace. This paper examines what Locky is, how it works, and the mechanics of this malware to understand how ransom payments are made. The financial impact of Locky is found to be substantial. The paper describes methods for “following the money” to assess how effectively such a digital forensic trail can assist ransomware investigators. The legal instruments that are being established by the authorities as they attempt to shut down ransomware attacks and secure prosecutions are evaluated. The technical difficulty of following the money coupled with a lack of registration and disclosure legislation mean that investigators of this cybercrime are struggling to secure prosecutions and halt Locky.


This item appears in the following Collection(s)

Show simple item record