Preprint Article Version 1 This version is not peer-reviewed

Exploring the Impact of Crypto-Ransomware on Critical Industries: Case Studies and Solutions

Version 1 : Received: 17 September 2024 / Approved: 17 September 2024 / Online: 18 September 2024 (03:22:52 CEST)

How to cite: Meng Jun, A. Y.; Jinu, B. A.; Seng, L. K.; Maharaiq, M. H. F. B. Z.; Khongsuwan, W.; Junn, B. T. K.; Hao, A. A. W.; Sindiramutty, S. R. Exploring the Impact of Crypto-Ransomware on Critical Industries: Case Studies and Solutions. Preprints 2024, 2024091325. https://doi.org/10.20944/preprints202409.1325.v1 Meng Jun, A. Y.; Jinu, B. A.; Seng, L. K.; Maharaiq, M. H. F. B. Z.; Khongsuwan, W.; Junn, B. T. K.; Hao, A. A. W.; Sindiramutty, S. R. Exploring the Impact of Crypto-Ransomware on Critical Industries: Case Studies and Solutions. Preprints 2024, 2024091325. https://doi.org/10.20944/preprints202409.1325.v1

Abstract

Crypto-ransomware has emerged as one of the most significant cybersecurity threats in recent years. Ransomware attacks, particularly those involving the encryption of data and demanding payment in cryptocurrency, have caused severe disruptions across various critical industries, including healthcare, energy, and finance. The proliferation of these attacks is largely attributed to the anonymity provided by cryptocurrency transactions and the increasing sophistication of cybercriminal tactics. The impact of ransomware extends beyond immediate financial losses, often leading to prolonged operational downtime, reputational damage, and even risks to public safety. In this research paper, we explore the growing threat of crypto-ransomware by examining real-life case studies in key industries, analyzing the countermeasures taken, and proposing additional solutions to mitigate the risk. The goal is to raise awareness and provide actionable insights for organizations to better protect themselves against this pervasive threat.

Keywords

Crypto Ransomware; Cybersecurity; Ransomware Attack; Cryptocurrency; Data Encryption

Subject

Computer Science and Mathematics, Computer Science

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.