TY - GEN
T1 - Tracking Ransomware End-to-end
AU - Huang, Danny Yuxing
AU - Aliapoulios, Maxwell Matthaios
AU - Li, Vector Guo
AU - Invernizzi, Luca
AU - Bursztein, Elie
AU - McRoberts, Kylie
AU - Levin, Jonathan
AU - Levchenko, Kirill
AU - Snoeren, Alex C.
AU - McCoy, Damon
N1 - Publisher Copyright:
© 2018 IEEE.
PY - 2018/7/23
Y1 - 2018/7/23
N2 - Ransomware is a type of malware that encrypts the files of infected hosts and demands payment, often in a crypto-currency like Bitcoin. In this paper, we create a measurement framework that we use to perform a large-scale, two-year, end-to-end measurement of ransomware payments, victims, and operators. By combining an array of data sources, including ransomware binaries, seed ransom payments, victim telemetry from infections, and a large database of bitcoin addresses annotated with their owners, we sketch the outlines of this burgeoning ecosystem and associated third-party infrastructure. In particular, we are able to trace the financial transactions, from the acquisition of bitcoins by victims, through the payment of ransoms, to the cash out of bitcoins by the ransomware operators. We find that many ransomware operators cashed out using BTC-e, a now-defunct Bitcoin exchange. In total we are able to track over $16 million USD in likely ransom payments made by 19,750 potential victims during a two-year period. While our study focuses on ransomware, our methods are potentially applicable to other cybercriminal operations that have similarly adopted Bitcoin as their payment channel.
AB - Ransomware is a type of malware that encrypts the files of infected hosts and demands payment, often in a crypto-currency like Bitcoin. In this paper, we create a measurement framework that we use to perform a large-scale, two-year, end-to-end measurement of ransomware payments, victims, and operators. By combining an array of data sources, including ransomware binaries, seed ransom payments, victim telemetry from infections, and a large database of bitcoin addresses annotated with their owners, we sketch the outlines of this burgeoning ecosystem and associated third-party infrastructure. In particular, we are able to trace the financial transactions, from the acquisition of bitcoins by victims, through the payment of ransoms, to the cash out of bitcoins by the ransomware operators. We find that many ransomware operators cashed out using BTC-e, a now-defunct Bitcoin exchange. In total we are able to track over $16 million USD in likely ransom payments made by 19,750 potential victims during a two-year period. While our study focuses on ransomware, our methods are potentially applicable to other cybercriminal operations that have similarly adopted Bitcoin as their payment channel.
KW - bitcoin
KW - blockchain
KW - malware
KW - ransomware
UR - http://www.scopus.com/inward/record.url?scp=85051044249&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85051044249&partnerID=8YFLogxK
U2 - 10.1109/SP.2018.00047
DO - 10.1109/SP.2018.00047
M3 - Conference contribution
AN - SCOPUS:85051044249
T3 - Proceedings - IEEE Symposium on Security and Privacy
SP - 618
EP - 631
BT - Proceedings - 2018 IEEE Symposium on Security and Privacy, SP 2018
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 39th IEEE Symposium on Security and Privacy, SP 2018
Y2 - 21 May 2018 through 23 May 2018
ER -