Journal Screenshot

International Journal of Academic Research in Business and Social Sciences

Open Access Journal

ISSN: 2222-6990

Ransomware a Concealed Weapon of Cyber Extortion: The Beginning Unfolded

Haitham Hilal Al Hajri, Badar Mohammed Al Mughairi, Asif Mahbub Karim, Md. Nasiruzzaman, Mohammad Imtiaz Hossain

http://dx.doi.org/10.6007/IJARBSS/v9-i7/6190

Open access

The technology has indeed resolved so fast, that what it used to be a Sci-Fi movies in yester years, is a conventional reality today. Lot of ordinary accessories’ have turned to be smart, especially now we are at the peak of an era of wearable technology and internet of things (IoT). The ongoing growth of innovation within the information and communication technology (ICT) sector is massive, practically the smart mobiles revolution which has shown a large scale adoption that it became an essential part of the daily human interactions. However, cybercriminals have found new grounds to explore potential abuse and misuse, where they have merged and resurrected legacy threats to be implemented on modern tech. This article is methodically illustrating a specific kind of cyber threat known as a ransomware which not only attacks cooperate computers and networks, but it has set the path to newer technology trends such as IoT and smart mobile devices. This paper will also highlight the evaluation of the malware known as ransomware and how it has become a global threat, Additionally to recommend on how to stay protected against such threat.

Labs, M. (2016 ). Taking Steps to Fight Back against Ransomware, McAfee Labs on. Retrieved from Mcafee Securing Tomorrow:
https://securingtomorrow.mcafee.com/mcafee-labs/taking-steps-to-fight-back-against-ransomware/
Micro, T. (2016). Ransomware: Behind the Scenes . Retrieved from
https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/ransomware-behind-the-scenes
Networks, P. A. (2017). Unit 42 Report Ransomware: unlocking the lucrative criminal business model. Retrieved from paloaltonetworks:
https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/research/ransomware-report
Lipovský, P., Štefanko, L., and Braniša, G. (2016). Rise of Android Ransomware. Retrieved from welivesecurity: https://www.welivesecurity.com/wp-
content/uploads/2016/02/Rise_of_Android_Ransomware.pdf

In-Text Citation: (Hajri, Mughairi, Karim, Nasiruzzaman, & Hossain, 2019)
To Cite this Article: Hajri, H. H. Al, Mughairi, B. M. Al, Karim, A. M., Nasiruzzaman, M., & Hossain, M. I. (2019). Ransomware a Concealed Weapon of Cyber Extortion: The Beginning Unfolded. International Journal of Academic Research in Business and Social Sciences, 9(7), 915–922.