This HTML5 document contains 27 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
n9https://kar.kent.ac.uk/77176/
n20doi:10.1007/
dctermshttp://purl.org/dc/terms/
n2https://kar.kent.ac.uk/id/eprint/
n14https://kar.kent.ac.uk/id/eprint/77176#
wdrshttp://www.w3.org/2007/05/powder-s#
dchttp://purl.org/dc/elements/1.1/
n11http://purl.org/ontology/bibo/status/
rdfshttp://www.w3.org/2000/01/rdf-schema#
n13https://demo.openlinksw.com/about/id/entity/https/raw.githubusercontent.com/annajordanous/CO644Files/main/
n5http://eprints.org/ontology/
n4https://kar.kent.ac.uk/id/event/
bibohttp://purl.org/ontology/bibo/
n18https://kar.kent.ac.uk/id/org/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
owlhttp://www.w3.org/2002/07/owl#
n6https://kar.kent.ac.uk/id/document/
n10https://kar.kent.ac.uk/id/
xsdhhttp://www.w3.org/2001/XMLSchema#
n16https://demo.openlinksw.com/about/id/entity/https/www.cs.kent.ac.uk/people/staff/akj22/materials/CO644/
n17https://kar.kent.ac.uk/id/person/

Statements

Subject Item
n2:77176
rdf:type
bibo:Article n5:EPrint n5:BookSectionEPrint bibo:BookSection
rdfs:seeAlso
n9:
owl:sameAs
n20:978-3-319-73697-6_3
n5:hasDocument
n6:3190747 n6:3190735 n6:3190811 n6:3190812 n6:3190813 n6:3190810
n5:hasPublished
n6:3190735
dc:hasVersion
n6:3190735
dcterms:title
On Locky Ransomware, Al Capone and Brexit
wdrs:describedby
n13:export_kar_RDFN3.n3 n16:export_kar_RDFN3.n3
dcterms:date
2018-01-06
dcterms:creator
n17:ext-j.macrae@ulster.ac.uk n17:ext-v.franqueira@kent.ac.uk
bibo:status
n11:peerReviewed n11:published
dcterms:publisher
n18:ext-1c5ddec173ca8cdfba8b274309638579
bibo:abstract
The highly crafted lines of code which constitute the Locky cryptolocker ransomware are there to see in plain text in an infected machine. Yet, this forensic evidence does not lead investigators to the identity of the extortionists nor to the destination of the ransom payments. Perpetrators of this ransomware remain unknown and unchallenged and so the ransomware cyber crimewave gathers pace. This paper examines what Locky is, how it works, and the mechanics of this malware to understand how ransom payments are made. The financial impact of Locky is found to be substantial. The paper describes methods for “following the money” to assess how effectively such a digital forensic trail can assist ransomware investigators. The legal instruments that are being established by the authorities as they attempt to shut down ransomware attacks and secure prosecutions are evaluated. The technical difficulty of following the money coupled with a lack of registration and disclosure legislation mean that investigators of this cybercrime are struggling to secure prosecutions and halt Locky.
dcterms:isPartOf
n10:repository
bibo:authorList
n14:authors
bibo:presentedAt
n4:ext-77aa8805a3b5fa6775b55f479b986602