“I was told to buy a software or lose my computer. I ignored it”: A study of ransomware

Camelia Simoiu, Christopher Gates, Joseph Bonneau, Sharad Goel

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Ransomware has received considerable news coverage in recent years, in part due to several attacks against high-profile corporate targets. Little is known, however, about the prevalence and characteristics of ransomware attacks on the general population, what proportion of users pay, or how users perceive risks and respond to attacks. Using a detailed survey of a representative sample of 1,180 American adults, we estimate that 2%-3% of respondents were affected over a 1-year period between 2016 and 2017. The average payment amount demanded was $530 and only a small fraction of affected users (about 4% of those affected) reported paying. Perhaps surprisingly, cryptocurrencies were typically only one of several payment options, suggesting that they may not be a primary driver of ransomware attacks. We conclude our analysis by developing a simple proof-of-concept method for risk-assessment based on self-reported security habits.

Original languageEnglish (US)
Title of host publicationProceedings of the 15th Symposium on Usable Privacy and Security, SOUPS 2019
PublisherUSENIX Association
Pages155-174
Number of pages20
ISBN (Electronic)9781939133052
StatePublished - Jan 1 2019
Event15th Symposium on Usable Privacy and Security, SOUPS 2019 - Santa Clara, United States
Duration: Aug 12 2019Aug 13 2019

Publication series

NameProceedings of the 15th Symposium on Usable Privacy and Security, SOUPS 2019

Conference

Conference15th Symposium on Usable Privacy and Security, SOUPS 2019
Country/TerritoryUnited States
CitySanta Clara
Period8/12/198/13/19

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of '“I was told to buy a software or lose my computer. I ignored it”: A study of ransomware'. Together they form a unique fingerprint.

Cite this