Evolving Threats in Cybersecurity: Analyzing the Rise of Ransomware in the Post-Covid Era

Chief Editors:  Mr. Irshadullah Asim Mohammed, Dr. Yogesh Mohan Gosavi, and Prof. (Dr.) Vineeta Kaur Saluja

Associate Editor: Mrs. Sruthi S

Co-Editors: Dr. S. Rajeswari, Dr. Nikhil Saini, and Ms. Atreyee Banerjee

ISBN:  978-81-985805-1-1

Chapter: 47

Author: Dr. Pradeep Sudhakaran

DOI: https://doi.org/10.59646/mrnc47/321

Abstract

The landscape of cybersecurity has witnessed significant shifts in the post-COVID era, with ransomware emerging as one of the most pervasive threats. The widespread adoption of remote work, increased digital transformation, and heightened reliance on cloud services have expanded the attack surface for cybercriminals. This study explores the evolution of ransomware attacks, analyzing key trends, attack vectors, and vulnerabilities that have contributed to their rise. Additionally, it examines the role of sophisticated threat actors, the impact of ransomware-as-a-service (RaaS) models, and the exploitation of zero-day vulnerabilities. Governments and organizations worldwide have been compelled to adopt advanced security frameworks, incident response strategies, and regulatory measures to mitigate these risks. However, the rapid evolution of ransomware tactics, including double extortion and supply chain attacks, necessitates continuous adaptation of cybersecurity defenses. This paper highlights the importance of proactive threat intelligence, artificial intelligence-driven security solutions, and cross-sector collaboration in combating ransomware. By understanding these evolving threats, stakeholders can develop more robust cybersecurity strategies to safeguard critical infrastructure, businesses, and individuals against ransomware in the digital age.

References

  1. Anderson, R. (2021). Security Engineering: A Guide to Building Dependable Distributed Systems (3rd ed.). Wiley.
  2. Bhardwaj, A., & Gupta, R. (2022). The evolution of ransomware: Trends, tactics, and mitigation strategies. Journal of Cybersecurity Research, 14(2), 112–128.
  3. Brown, K., & Wilson, J. (2021). The impact of ransomware on global businesses post-COVID-19. International Journal of Information Security, 20(3), 215–230.
  4. Cardenas, A. A., Manadhata, P., & Rajan, S. (2020). Ransomware resilience: The importance of cyber hygiene. Cybersecurity & Privacy Journal, 5(1), 45–62.
  5. Chawla, N., & Saxena, P. (2022). The shift in ransomware attack vectors: A post-pandemic analysis. Computers & Security, 32(4), 178–192.
  6. Clarke, R. (2021). Cyber warfare and ransomware: An emerging geopolitical threat. Journal of Cyber Conflict, 9(2), 98–116.
  7. Conti, M. (2022). The role of artificial intelligence in detecting ransomware attacks. Journal of Emerging Cyber Threats, 18(1), 72–88.
  8. Dang, L. H., & Nguyen, P. (2021). Zero-day vulnerabilities and their exploitation in modern ransomware attacks. Information Security Review, 12(3), 140–156.
  9. Farooq, M., & Akhtar, S. (2020). The rise of ransomware-as-a-service (RaaS): A systematic review. International Journal of Cyber Threats, 11(2), 65–82.
  10. Fernandez, J., & Kim, D. (2021). Understanding ransomware in critical infrastructure sectors: A case study approach. Cyber Defense Strategies, 15(3), 102–117.
  11. Green, H., & Patel, S. (2022). Post-pandemic cybersecurity policies: Evaluating governmental responses to ransomware. Government Cybersecurity Reports, 10(2), 85–99.
  12. Hall, T., & Morgan, L. (2020). The economic impact of ransomware: A post-COVID perspective. Journal of Digital Risk, 8(4), 59–74.
  13. Jain, R., & Sharma, V. (2022). Advanced persistent threats and ransomware: A dangerous combination. Cybersecurity Analysis & Research, 17(1), 37–53.
  14. Johnson, P. (2021). Social engineering in ransomware attacks: The weakest link in cybersecurity. Human Factors in Cybersecurity, 7(2), 19–35.
  15. Kumar, S., & Singh, A. (2022). The evolution of double extortion ransomware: Trends and defenses. Journal of Computer Security, 25(3), 112–126.