Important Notice: Our web hosting provider recently started charging us for additional visits, which was unexpected. In response, we're seeking donations. Depending on the situation, we may explore different monetization options for our Community and Expert Contributors. It's crucial to provide more returns for their expertise and offer more Expert Validated Answers or AI Validated Answers. Learn more about our hosting issue here.

One question that is typically asked in regards to cryptoviral extortion is the following. How could an extortionist ever expect to receive payment?

0
Posted

One question that is typically asked in regards to cryptoviral extortion is the following. How could an extortionist ever expect to receive payment?

0

e-cash (which may someday be minted off-shore) could provide a safe medium for ransom. Mix networks are also a critical infrastructure for allowing the extortionist to maintain his or her anonymity. Also, the extortionist could seek information that resides on the host machine instead of money. In this case it may be possible for the malware to asymmetrically encrypt the following: cryptographic hash of the desired data concatenated with the randomly generated symmetric key. This would make it so that the symmetric key could not be recovered without revealing the correct hash [YY96a]. See [YY04] for attacks of this nature.

What is your question?

*Sadly, we had to bring back ads too. Hopefully more targeted.

Experts123