Crypto jacking and its Types
Crypto jacking is an illegal activity where attackers use another person’s computer to mine cryptocurrency. Attackers achieve this by enticing and tricking computer users to click on a particular link that that executes crypto mining code on their computer, or injecting a JavaScript code to a website that pops up and executes automatically when loaded in the browser. It is not yet certain the amount of cryptocurrency that hackers mine by carrying out crypto jacking, but there is no doubt that the practice is on the rise. However, it is important to note that the rapidly growing type of crypto jacking is browser-based. A research done in 2017 revealed that more than 35000 websites were running crypto mining scripts and had more than 1 billion visitors combines (Brewer, 2016). The concept of crypto mining is still new and there is still room for evolution and growth. For instance, it is easy to generated more than $300 using coinhive in the first month. One major reason why crypto jacking is on the rise is because it is easy to get money.
Cyber security researchers in January 2018 discovered a crypto mining botnet called Smominru which infected more than 500000 computers, majorly in India, Russia, and Taiwan. Windows servers were the target of the botnet. Crypto jacking does not require proficient technical expertise. The driving force of crypto jacking that is making it more popular among the hackers is because of the minimal risk involved while making more money and find it more profitable as compared to ransomware because it generates money continuously (Broadhurst, et al., 2018). Additionally, the probability of being identified or getting caught is much less as compared to ransomware. Crypto mining code can go undetected for a very long time because it runs surreptitiously and once identified it is very challenging and difficult to trace the source.
Attackers have to major ways of getting into the computer of the victim to mine crypto currency secretly. One way is through phishing where the attacker sends an email that looks legitimate and tricks the victim into clicking the link on the email which once clicked the crypto mining code loads on the computer and continuously run while the victim works on his/her computer (Sigler, 2018). The second method is by injecting crypto mining scripts on several websites which entices the users and visitors to click on it. Once the user opens their browser, the script is executed automatically. In this method, no code is store on the computer of the victim rather the code executes mathematical problems that are complex and transmit results to the hacker’s server computer. In order to maximize their return, attacker often use both methods. Often hackers utilize old malware techniques to deliver more persistent and reliable software to the target computers.
Crypto jacking code do not damage the data or the target computer unlike other modes of malware. However, they utilize the processing resources making the victims computers to be slower in performance. Some of the examples of real-world crypto jacking include badshell which utilized windows processes to carry out its mining, using GitHub to serve Crypto miners, and exploiting rTorrent vulnerability Calvão, 2018).
Real-world Crypto Malware Operations
This document will focus on creating a new crypto malware called CryptoSpringMalware. This particular cryptocurrency malware will be designed as a Google Chrome extension malware that uses social media platforms such as Twitter, Facebook, and LinkedIn accessed through the chrome browser to infect the target computers. The malware will operate as an adware and will have the ability to extends itself once executed on the host computer. This malware delivers malicious links through social media accounts and steals login credentials and web accounts allowing it to inject crypto mining scripts in to the web pages. It utilizes miscellany methods to infect cryptocurrency trading platforms when the users access them on an infected browser and uses social media accounts to propagate it (Higbee, 2018). CryptoSpringMalware maintains the routine of listing socially engineered links using the affected social media accounts and sending them to the friends of that user. This malware has the ability to redirect the users to cryptocurrency scam sites, hijacks transactions on trading platform, redirects users to the cryptocurrency programs, and injects malicious crypto mining scripts on the web page.
CryptoSpringMalware is designed to propagate through social media accounts when users click on the ad containing the link to the browser extension and installs it and delivers socially engineered links (Rivin and Scevola, 2018). On clicking on the links, the users are redirected to fake Cryptocurrency website that will prompt the visitors to install a code extension. CryptoSpringMalware tricks users that they have to install the plugin for them to be able to load the webpages correctly. It then asks the user to give it privilege access and permission to change data on the website that was opened.
Once the malware has been installed and permission granted, additional malicious code will be downloaded by CryptoSpringMalware from the attacker’s server and loads the social media website. Upon loading the website, the extension will send requests to the hacker’s server to confirm if the script has been enabled. Once enables the script will request social media site such as LinkedIn or Facebook for OAuth access and start carrying out a series of queries to get the account details, list of Facebook friends, and sends the fake video to the Facebook contacts who are in idle or online status. If access via a different browser, the malicious link will change to random advert and tricks the user to click on it (Ismail, Marsono, Khammas and Nor, 2015).
While designing the malware the focus was to reduce the chance of making the malware detectable to the security applications that the users has installed on their workstations. Once the malware has been installed, additional JavaScript code is downloaded from the attacker’s server when the user opens the browser. CryptoSpringMalware queries the attacker’s server every time the victim opens a new web page to retrieve another JavaScript code and load its properties on that webpage.
The following are some of the malicious behaviors of CryptoSpringMalware: it steals account credentials of the victims using MyMonero, Googlem and Coinhive cryptocurrency platforms. On detecting the target website login page is open, CryptoSpringMalware will inject a script to that will send login credentials to the attacker’s server after the user has entered the login details and pressed on login button. Upon detecting that the user is accessing cryptocurrency trading platform that is it targeting or is typing keywords in the URL like eth-, blockchain, or ethereum, CryptoSpringMalware will redirect the users to a scam webpage. The scam tricks users to send up to 10 ETH to the wallet address of the attacker who promises to send back up to 100 ETH for the purpose of verification (Jang, et al., 2016). The CryptoSpringMalware also performs malicious web cryptocurrency mining by injecting JavaScript code to the web pages that the victim opens. It also has the capacity to hijack cryptocurrency transactions once the user has launched a cryptocurrency related website.
Designing CryptoSpringMalware Operation
CryptoSpringMalware has a persistence mechanism that prevent users from uninstalling the malicious extension from Google Chrome so as to increase the amount of trials for crypto mining to increase the amount of cryptocurrency. The malware achieves this by auto closing the new tab when the user opens the extension management tab “chrome://extensions/” to prevent the victims from accessing it. The malware upon getting access to the cryptocurrency credentials will be deducting the script will be deducting 0.001% of any transaction made on the affected account. The small percentage is to ensure that the user does not detect any effects on the amount being transacted. The script will be able to send the money to the attacker’s cryptocurrency account.
The malware has employed almost similar properties as any other cryptojacking, the common cryptojacking countermeasures can be used (Kapse and Gupta, 2015). There are several mitigation strategies for this crypto jacking malware and are categorized as follows:
Since this is a new malware, Google Chrome does not have the signatures that detects how this malware operates. But since it has employed the script from CoinHive, there are some similarities in the patterns of how the malware operates making it relatively security to keep on removing any cryptocurrency malware uploaded to chrome web store (Mahawer and Nagaraju, 2013). The propagation techniques and the behaviors of CryptoSpringMalware can be idemtified since it uses similar scripts and code from CoinHive it easier to come up with mitigation strategies. Additionally, need to learn and practice the good security behavior in order to protect themselves from falling into such traps. Before you share the message analyze it in order to be more prudent against suspicious or unsolicited messages and links and enable advanced privacy settings on social media accounts.
Installing ad-blocking extensions on web browsers is also another way to mitigate CryptoSpringMalware which are difficult to detect. By installing add-blocking extensions, users will be able to effectively protect themselves from ad-based crypto jacking scripts. Example of such browser extension with the ability to detect and prevent crypto mining scripts are MinerBlock and NoCoin. In addition to this, it is essential to constantly update web filtering tools. On identifying any web page with crypto mining properties, block all the users from having to access it (Monge, Vidal and Villalba, 2018). To avoid falling victims to malicious extensions, users should maintain their extension without having to install new ones because they can be used by hackers to run crypto mining scripts.
This malware does not only target computers but also mobile devices such as tablets and phones in spite of their low processing speed. There are several mobile device management solutions that allows users to manage extensions and applications on their devices reducing the risk of hackers attacking them.
Installing a network monitoring solution can be a great way to easily identify and block crypto jacking in an enterprise network that uses end-point solutions for customers which are often used on personal devices. The information security team can collect data from the network monitoring tools for analysis in order to identify the particular threats more accurately. It also facilitates traceability of the crypto jacking activity to identify the devices that have been affected.
Malicious Behavior of CryptoSpringMalware
Upon detecting a web-based attack, the following steps can be followed in order to effectively respond to it: close the tab that is running the crypto mining script, note the URL and block it on the web filters to avoid any future access. Regularly update the extensions on the browser and uninstall all the extension that are no longer needed. The following figure shows how to protect users from web-based crypto jacking attacks:
It is crucial to install security programs that detects and blocks crypto currency miners automatically in your browser. For instance, figure 11 shows how Malwarebytes block cryptocurrency scripts stopping them from executing on your browser. Operating system security programs do not provide sufficient protection from the crypto jackers and thus it is necessary to check if the software is blocking the mining scripts.
To continuously protect the computer devices from attacks it is necessary to implement the latest security patches and updates from trusted sources to avoid installing malware in form of a security software. Additionally, it is important to continuously monitor task manager if you find that your computer is running slow than it would normally.
There exist several other ways that can be adopted in blocking and stopping crypto mining scripts from executing. One effective way that has been proven to be very effective is using advanced security extensions which are mostly provided by chrome browser. Most of these security extensions are open source and are available freely and allows the users to either black list or whitelist any malicious activity by blocking the blacklist.txt that have been blacklisted in the domains (Vitt, 2013).
NoScript is another Firefox browser extension that block JavaScript scripts with cryptocurrency mining properties. Several browsers allow users to set the browser to block adverts and thus blocking any crypto currency that may come in the form of an advert. Since crypto jacking often happen on web browsers, many hackers tend to write malicious scripts targeting them in order to inject the scripts on affected websites.
Many cyber security experts have recommended the use of MinerBlock in preventing crypto jacking form happening in your browser. This is also one of the simplest solution because it does not require any additional setting. This solution uses two methods to prevent crypto jacking: detection of JavaScript running crypto jacking properties and using the frequently updated blacklist (Sun, Fang and Zou, 2016). It is open source and is available for Firefox and Chrome browsers.
CoinBlockerLists s another effective way of using network firewall to prevent crypto jacking malicious code and scripts from getting into the users’ computers. These lists are update regularly because new malicious domains are identified frequently. The lists are available in different formats which can be integrated into the existing security programs or extension easily. It can be integrated into FireHOL and Little Snitch to prevent CryptoSpringMalware from getting into the network.
There are no specific legal counter measures for CryptoSpringMalware since it is new. Currently, many companies and businesses are facing threats from cryptojacking such as CryptoSpringMalware and since this is a new cybercrime there are no standard legal framework that governs such crimes globally. Many companies have fallen victims and even if they find the culprits there are no laws that binds them that they are doing an illegal activity since the attackers are often from different countries under different jurisdictions. For instance, a hacker in Russia may attack a company based in the United states. These countries operate under different cybercrime laws and jurisdiction and thus even if the attacker is identified there is no common law that governs this crime (Calvão, 2018). This demands for the need to have standard laws to address these illegal activities perpetrated over the internet.
Mitigation Strategies
Perpetrators of crypto jacking has continuously targeted websites and domains where users spent more time because their intention is to get crypto money. The legal consequences of such actions are not clear even if the unwelcomed and intrusive nature of cryptojacking is evident. With the possible impair access of information, overheated machine, and economic sabotage, crypto jacking has clearly become one of the biggest threats facing cryptocurrency businesses in the form of malicious advertising and is a quite hard to deal with it using the existing legal framework (Faruk, 2018).
Coming up with standard acceptable legal standards and framework will reduce the frustration that users and businesses are facing due to the undesired and unwanted intrusion to their digital lives and the cost consequences that businesses have to face because of the slowing system performance because of injection of cryptojacking scripts such as CryptoSpringMalware. Crypto jacking costs businesses and individuals almost $5 every month for every computer. This is a significant amount if it involves many computers. Crypto jacking has started taking the shape of a legitimate threat because of most of the company computers are left running overnight increasing the number of crypto jacking attempts that can be detected (Subramaniam and Ravi, 2016).
The novelty of both cryptojackers and cryptocurrency, exploited and exploiters somehow confront unfamiliar legal environment. First, attorneys and lawyers have to find out whom to sue and collect evidence regarding the suspected person. Advertising over the internet have a complex architecture that involves several parties and is fast-paced. CoinHIve has been identified as the service that offers scripts responsible for crypto jacking attacks. Any potential user with the intention to get easy money can just use the code and scripts provided by CoinHive and inject it in a domain or website and just wait for money to be sent. It has been noted that the miner keeps 70% of the currency while CoinHive takes 30% (Sheer, Shouping, Sidra and Sharif, 2018).
One of the legal options that several governements have agreed on is the Computer Fraud and Abuse Act (CFAA) that protects private and government computers from unauthorized access. This act identifies various causes of action based on the type and nature of the unpermitted access. Sections 1030(g) and 1030(a)(2)(C) are the most likely provisions to address the cryptojacker (Hegadekatti, 2016). These sections states that an individual or business entity that suffers from loss or damage because of actions propagated by a third party intentionally using a computer without proper authorization and obtains information are subject to answer to the law.
The following are some of the people to bring CFAA claims against: the party responsible for the advert containing crypto jacking code, the website serving adverts with crypto mining code, crypto jackers themselves, and CoinHive. If the website has been found to be serving suspicious adverts containing crypto jacking scripts occasionally, the possible scope of liability will be bigger. Nevertheless, the possible liability might make the website serving the ads to carefully select the types of ads they serve (Khidzev, 2016). Because of the high level of automation involved in ad websites, it is unlikely for CFAA suits targeting ad websites serving malicious scripts like CryptoSpringMalware to be successful. CFAA requires that any party getting unauthorized access should be doing so intentionally making the websites serving ads to evade such policy for reason that they did it unintentionally. Both the party behind the adverts and the website have good and arguable arguments that if there was unauthorized access, it was not intentional because background processes auctioning browsing behavior to the bidders is automated.
Engineering Countermeasures
This leaves cryptojackers and CoinHive because there is a weak accusation that CoinHive intentionally gain unauthorized access to the computing devices with the cryptocurrency mining scripts because it gives cryptojackers the directions and guidelines to simply embed their scripts and start mining. Additionally, the factory setting was set to enable mining in full-power, that is, the code spends no time idling and uses all the available processing power. It is possible that CoinHive wants to exploit much computing power given that it receives 30% of the mined currency when its script or code is used (Patel, 2012). Even though this may qualify as legally intentional unauthorized access to particular device, it is less certain.
Cryptojackers are also answerable to CFAA because they are people responsible for embedding the code with the intention of mining cryptocurrency and hijacking the CPU of the users. Cryptojackers should be the people liable to unauthorized access. For the victims, unfortunately, blockchain, the nature of mining, and cryptocurrency make it difficult to trace the transactions (Laws Editorial Office, 2015). Discovering the identity of crypojackers is challenging despite being the targets for CFAA suit making the websites serving the adverts containing CryptoSpringMalware more reasonable targets.
The victims also need to prove their CFAA claims after considering possible targets for CFAA claims. The victims should be able to show evidence that they suffered a loss or damage caused by third party who gained access to their computers and collected information without authorization. Section 1030 (e) (11) addresses this claim and defines loss as any cost incurred by the victim such as cost of assessing damage, cost of responding to an offense, cost of restoring the system, data, programs, and any revenue lost due to the activities of the third party (Ulyanava, 2018). Section 1030 (e) (8) defines damage as any impairment to availability of the system, data, program, integrity, or information. Providing laws governing loss or damage caused through cryptojacking is important. Identifying the loss and damage due to cryptojacking is much easier because it causes both digital and physical harm. The user’s computer can overheat if the crypto jacking code running on it was written poorly. It can further damage the equipment or cause data unavailability (Mann, Warren and Kennedy, 2018).
Since CryptoSpringMalware also consumes CPU power, which is also a source of revenue, it breaks the law by preventing the users from using the full potential provided by the computer to increase productivity. To organizations, CPU is very crucial for processing data, calculations, and coordination activities and compromising it will delay the operations within the business. Moreover, cryptojacking also increases operational and maintenance cost because the victims have to increase electricity cost (cooling) (Szczerbowski, 2018).
The source of cryptojacking code, the website, and the party responsible for the advertisement served all have the possibility of exceeding authorized access to the computer of the victim in the case of cryptojacking. By displaying the ads with malicious code, the website exceeds authorized access. The source of the malicious code would be the most logical party to file a claim against. Authorization is exceeded by the code that has been designed by third party to convert the CPU of the uses into cryptocurrency. For the victims, much of the reasons for cryptocurrency is to enable transactions that are difficult to track (Stokel-Walker, 2018). CFAA often focuses on targets that can be easily traced like the websites displaying the malicious ads.
Legal Countermeasures
To stop these attacks, businesses and organizations are required to constantly monitor their computer performance, networks, and websites. Protection should be installed if they are using third party tools and ensure that they are not directly linked to the source code which do not belong to them. Additionally, businesses should invest in security and IT personnel and equipment that provides a holistic view of the activities going on in their environment because they can stop what they cannot see. Also, the businesses should focus on layered approach to cyber security because it detects attacks, prevents them, and reduce those that can go through (Calvão, 2018). It also facilitates cybersecurity experts to take necessary immediate actions to contain software vulnerabilities and malicious activities. It might seem financially costly to outlay on a layered cybersecurity solution, but it is a critical insurance policy against cyrptojacking attacks which could cripple business operations. Investing in cybersecurity is worth compared to what cryptojacking can cost the business if not protected.
Market volatility is another economic approach that may shy off crypto attackers. When the crypto currency platforms reduce the transactions they do or if there is a downward trend in criminals might actually pull off (Smith and Kumar, 2018). This is because if cryptojacking proves that it is no longer profitable because whatever they invest is not matching the rewards, then this may be a way to solve cryptojacking menace. Individual businesses cannot control the volatility of the cryptocurrency market, but what they can do is improve their infrastructure and enhance the security (Chen, HHrdle, Hou and Wang, 2018). Cybercriminals are contantly looking for vulnerabilities in the system so as to exploit them through cryptojacking code and scripts because it is the easiest way for them to make quick money. With the right mind set and tools, businesses can be able to deal with cryptojacking menace. Regular updates and upgrades of the operating systems and applications should be done because outdated systems are the most vulnerable targets for crptojackers. Key decision makers and the IT security teams have the responsibility to ensure propoer security framework has been put in place to protect the business and stop cryptojackers.
Facebook have implemented automated cyber security systems to automatically prevent any harmful links from being posted on Facebook. Additionally, it is essential to constantly update the antivirus installed on the computer so as to ensure you have strong and active protection. The users should stop loading links that have been shared to reduce the risk of falling in to such traps. Many browsers have implemented safe browsing features to protect the users from being tricked by attackers.
Studies have shown that this is the most effective approach of preventing suspicious websites, however, safe browsing does not guarantee total security such as stopping malicious links. Users should be trained in order to stay aware of the of the characteristics of crypto jacking script (Jensen, Dinger, Wright and Thatcher, 2017). Companies should create awareness on crypto jacking to ensure that employees or the general users are able to identify potential suspicious links and emails that may install a crypto mining malware on to their machines.
Economic Countermeasures
Also, it is important to learn and adapt because crypto jacking being a new concept, hackers will be able to continuously look for new ways to run the mining scripts on unauthorized computers. As such, by learning and training users on how hackers access the system you will be able to detect any emerging attempts on crypto jacking and respond properly.
Monitoring resources is another method of preventing crypto jacking using specific endpoint enterprise products. Several antimalware and antivirus like Kaspersky, Windows Defender, ESET, Norton Security Essentials have the ability to block many types of coinmining and crypto jacking malware such as CryptoSpringMalware. Other forms of monitoring resources, AV protection, and cloud infrastructure are crucial. Increased usage of the CPU for a prolonged period of time is an indicator that the system may have been compromised by crypto jacking and require immediate analysis (Kshetri and Voas, 2017). PRTG is the recommended network and resources monitoring needs for any crypto jacking incidences. Monitoring ensures that any unusual activity or resource utilization is identified easily and immediately.
Conclusion
The popularity of cryptojacking malware is on the rise and this requires that individuals taking part in cryptocurrency platforms to take extra caution to ensure that they don’t fall the victims of crypto jacking. Attackers have to major ways of getting into the computer of the victim to mine crypto currency secretly. One way is through phishing where the attacker sends an email that looks legitimate and tricks the victim into clicking the link on the email which once clicked the crypto mining code loads on the computer and continuously run while the victim works on his/her computer. The second method is by injecting crypto mining scripts on several websites which entices the users and visitors to click on it. Once the user opens their browser, the script is executed automatically. In this method, no code is store on the computer of the victim rather the code executes mathematical problems that are complex and transmit results to the hacker’s server computer. In order to maximize their return, attacker often use both methods. Often hackers utilize old malware techniques to deliver more persistent and reliable software to the target computers.
This malware delivers malicious links by infecting Facebook accounts and steals login credentials and web accounts allowing it to inject crypto mining scripts in to the web pages. It utilizes miscellany methods to infect cryptocurrency trading platforms when the users access them on an infected browser and uses Facebook messenger to propagate it. CryptoSpringMalware maintains the routine of listing socially engineered links using the affected Facebook account and sending them to the friends of that user. What makes CryptoSpringMalware difficult to detect is because it mimics a normal chrome extension but with crypto mining script. Additional JavaScript code is downloaded from the attacker’s server when the user opens the browser. Facebook have implemented automated cyber security systems to automatically prevent any harmful links from being posted on Facebook. Additionally, it is essential to constantly update the antivirus installed on the computer so as to ensure you have strong and active protection. The users should stop loading links that have been shared to reduce the risk of falling in to such traps. Many browsers have implemented safe browsing features to protect the users from being tricked by attackers. Crypto mining does not only target computers but also mobile devices such as tablets and phones. In spite of their low processing speed are also targeted by attackers. There are several mobile device management solutions that allows users to manage extensions and applications on their devices reducing the risk of hackers attacking them. There are several mitigation strategies for CryptoSpringMalware including installing ad blockers, antimalware, antiviruses, and browser extensions.
Education Countermeasures
Perpetrators of crypto jacking has continuously targeted websites and domains where users spent more time because their intention is to get crypto money. The legal consequences of such actions are not clear even if the unwelcomed and intrusive nature of cryptojacking is evident. With the possible impair access of information, overheated machine, and economic sabotage, crypto jacking has clearly become one of the biggest threats facing cryptocurrency businesses in the form of malicious advertising and is a quite hard to deal with it using the existing legal framework. One of the legal options that several governements have agreed on is the Computer Fraud and Abuse Act (CFAA) that protects private and government computers from unauthorized access. This act identifies various causes of action based on the type and nature of the unpermitted access. Sections 1030(g) and 1030(a)(2)(C) are the most likely provisions to address the cryptojacker. These sections states that an individual or business entity that suffers from loss or damage because of actions propagated by a third party intentionally using a computer without proper authorization and obtains information are subject to answer to the law. Market volatility is another economic approach that may shy off crypto attackers. When the crypto currency platforms reduce the transactions they do or if there is a downward trend in criminals might actually pull off. This is because if cryptojacking proves that it is no longer profitable because whatever they invest is not matching the rewards, then this may be a way to solve cryptojacking menace. It is important to learn and adapt because crypto jacking being a new concept, hackers will be able to continuously look for new ways to run the mining scripts on unauthorized computers. As such, by learning and training users on how hackers access the system you will be able to detect any emerging attempts on crypto jacking and respond properly.
Reference List
Brewer, R. (2016). Ransomware attacks: detection, prevention and cure. Network Security, 2016(9), pp.5-9.
Broadhurst, R., Lord, D., Maxim, D., Woodford-Smith, H., Johnston, C., Chung, H., Carroll, S., Trivedi, H. and Sabol, B. (2018). Malware Trends on ‘Darknet’ Crypto-Markets: Research Review. SSRN Electronic Journal.
Calvão, F. (2018). Crypto-miners: Digital labor and the power of blockchain technology. Economic Anthropology.
Calvão, F. (2018). Crypto-miners: Digital labor and the power of blockchain technology. Economic Anthropology.
Chen, C., HHrdle, W., Hou, A. and Wang, W. (2018). Pricing Cryptocurrency Options: The Case of CRIX and Bitcoin. SSRN Electronic Journal.
Faruk, N. (2018). Perspective Methods of Regulating Crypto-Currency Based on Blockchain Technologies in the Modern Economy. KnE Social Sciences, 3(2), p.355.
Harwick, C. (2014). Crypto-Currency and the Problem of Intermediation. SSRN Electronic Journal.
Hegadekatti, K. (2016). Regulating the Deep Web Through Controlled BlockChains and Crypto-Currency Networks. SSRN Electronic Journal.
Higbee, A. (2018). The role of crypto-currency in cybercrime. Computer Fraud & Security, 2018(7), pp.13-15.
Ismail, I., Marsono, M., Khammas, B. and Nor, S. (2015). Incorporating known malware signatures to classify new malware variants in network traffic. International Journal of Network Management, 25(6), pp.471-489.
Jang, J., Kang, H., Woo, J., Mohaisen, A. and Kim, H. (2016). Andro-Dumpsys: Anti-malware system based on the similarity of malware creator and malware centric information. Computers & Security, 58, pp.125-138.
Jensen, M., Dinger, M., Wright, R. and Thatcher, J. (2017). Training to Mitigate Phishing Attacks Using Mindfulness Techniques. Journal of Management Information Systems, 34(2), pp.597-626.
Kapse, G. and Gupta, A. (2015). Testing Android Anti-Malware against Malware Obfuscations. International Journal of Computer Applications, 111(17), pp.6-9.
Khidzev, A. (2016). Crypto-Currencies – An Introduction To Not-So-Funny Moneys. Law and modern states, 1.
Kshetri, N. and Voas, J. (2017). Do Crypto-Currencies Fuel Ransomware?. IT Professional, 19(5), pp.11-15.
Laws Editorial Office (2015). Acknowledgement to Reviewers of Laws in 2014. Laws, 4(1), pp.16-17.
Mahawer, D. and Nagaraju, A. (2013). Metamorphic malware detection using base malware identification approach. Security and Communication Networks, 7(11), pp.1719-1733.
Mann, M., Warren, I. and Kennedy, S. (2018). The legal geographies of transnational cyber-prosecutions: extradition, human rights and forum shifting. Global Crime, 19(2), pp.107-124.
Monge, M., Vidal, J. and Villalba, L. (2018). A novel Self-Organizing Network solution towards Crypto-ransomware Mitigation. Proceedings of the 13th International Conference on Availability, Reliability and Security – ARES 2018.
Patel, K. (2012). End User Policy in Combating Cyber Terrorism and Cyber Crime. Global Journal For Research Analysis, 3(1), pp.28-30.
Rivin, I. and Scevola, C. (2018). An Investable Crypto-Currency Index. SSRN Electronic Journal.
Sheer, A., Shouping, L., Sidra, F. and Sharif, A. (2018). Cyber-Crime: Peril, Global Issue and Legal Counterclaim. Asian Research Journal of Arts & Social Sciences, 6(2), pp.1-11.
Sigler, K. (2018). Crypto-jacking: how cyber-criminals are exploiting the crypto-currency boom. Computer Fraud & Security, 2018(9), pp.12-14.
Simmonds, M. (2017). How businesses can navigate the growing tide of ransomware attacks. Computer Fraud & Security, 2017(3), pp.9-12.
Smith, C. and Kumar, A. (2018). CRYPTO-CURRENCIES – AN INTRODUCTION TO NOT-SO-FUNNY MONEYS. Journal of Economic Surveys.
Stokel-Walker, C. (2018). Are you making cryptocurrency for crooks?. New Scientist, 237(3161), p.16.
Subramaniam, V. and Ravi, R. (2016). Cyber Crime Control Techno – Legal Network. SSRN Electronic Journal.
Sun, H., Fang, Y. and Zou, H. (2016). Choosing a Fit Technology: Understanding Mindfulness in Technology Adoption and Continuance. Journal of the Association for Information Systems, 17(6), pp.377-412.
Szczerbowski, J. (2018). Legalization of Bitcoin cryptocurrency.Private law aspects. Journal of Modern Science, 35(4), pp.91-104.
Ulyanava, K. (2018). Legal Regulation of the Crypto-Currency Taxation. Open Journal for Legal Studies, 1(1), pp.1-8.
Vitt, D. (2013). Breaking Bitcoin: Does Cryptocurrency Exchange Activity Lead to Increased Real Activity Outside Cryptocurrency Exchanges?. SSRN Electronic Journal.