IDEAS home Printed from https://ideas.repec.org/a/bhx/ojtjts/v6y2024i7p32-59id2399.html
   My bibliography  Save this article

Ransomware Attacks and Their Evolving Strategies: A Systematic Review of Recent Incidents

Author

Listed:
  • Sooraj Sudheer

Abstract

Ransomware attacks have emerged as a significant cybersecurity concern, posing intricate risks to individuals, institutions, and governments. Because cybercriminals are always improving their methods, it is important to understand how these changing approaches affect things. This study explores the complexity of ransomware attacks by looking into previous cases to identify trends, tactics, and how economic and technological advancements affect these risks. Through an extensive examination of cutting-edge ransomware tactics, the paper pinpoints a major research void with regard to current, fine-grained incident analyses and sector-specific impacts. A systematic literature review has been done using four ransomware and six cybersecurity keywords. The purpose of this study is to analyze the evolving complexity of ransomware attacks by examining past cases to identify trends, tactics, and the impact of economic and technological advancements on these risks. It also aims to address gaps in detailed incident analyses and sector-specific impacts, providing actionable insights and recommendations for strengthening cybersecurity defenses and legislative measures. The study adds to the body of knowledge by analyzing recent examples, identifying the dynamic nature of threat actor actions, and assessing the efficacy of countermeasures in a variety of industries through qualitative and quantitative data. The conclusions reached provide insightful analysis and practical suggestions for cybersecurity professionals to strengthen defenses, reduce risks, and predict future advancements in ransomware operations. In the end, this report hopes to set the groundwork for stronger cybersecurity standards and well-informed legislative solutions to counteract the increasingly complex ransomware techniques.

Suggested Citation

  • Sooraj Sudheer, 2024. "Ransomware Attacks and Their Evolving Strategies: A Systematic Review of Recent Incidents," Journal of Technology and Systems, CARI Journals Limited, vol. 6(7), pages 32-59.
  • Handle: RePEc:bhx:ojtjts:v:6:y:2024:i:7:p:32-59:id:2399
    as

    Download full text from publisher

    File URL: https://carijournals.org/journals/index.php/JTS/article/view/2399/2826
    Download Restriction: no
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:bhx:ojtjts:v:6:y:2024:i:7:p:32-59:id:2399. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chief Editor (email available below). General contact details of provider: https://www.carijournals.org/journals/index.php/JTS/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.