Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Ransomware Survey


  • Please log in to reply
2 replies to this topic

#1 pvestig

pvestig

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:09:50 PM

Posted 16 May 2017 - 10:43 AM

As part of a research project under one of the usual funders of unclassified basic research in the US, we are compiling a census of actual ransomware attacks, with the objective of detecting possible clues to attribution. A unique feature of this census is using linguistic tools to examine the dialog structure of each attack—how the attack unfolded as a conversation between the attacker and the victim. We do not need to know the identity of the victim, but do have a list of questions that we would like to pursue in a phone conversation with individuals willing to share their experiences. These questions concern the participants in the unfolding attack (characteristics of the victim; type of system infected; point of entry; what is known about the attacker or attackers; payment method and destination; whether and how law enforcement was involved), as well as the time-sequenced series of utterances among the participants. The study will be completed by the end of 2017, and a summary report will be made available to those who have contributed their experience to the census. If you would like to participate, please contact us by private message on this website, or at radarproject2017@gmail.com . The prime contractor for this effort has asked that we use a project-specific alias, but Lawrence Abrams at Bleeping Computer has reviewed the details and approved this post, and we are happy to disclose the funding agency to individuals who contribute to our study.



BC AdBot (Login to Remove)

 


#2 RolandJS

RolandJS

  • Members
  • 4,539 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Austin TX metro area
  • Local time:07:50 PM

Posted 16 May 2017 - 11:36 AM

My next door neighbor got hit with CryptoLocker - maybe I can encourage him to participate in your survey.


Edited by RolandJS, 16 May 2017 - 07:28 PM.

"Take care of thy backups and thy restores shall take care of thee."  -- Ben Franklin revisited.

http://collegecafe.fr.yuku.com/forums/45/Computer-Technologies/

Backup, backup, backup! -- Lady Fitzgerald (w7forums)

Clone or Image often! Backup... -- RockE (WSL)


#3 pvestig

pvestig
  • Topic Starter

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:09:50 PM

Posted 16 May 2017 - 11:37 AM

That's exactly the kind of input we're seeking. Thank you very much!






0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users