{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T06:27:00Z","timestamp":1769927220502,"version":"3.49.0"},"reference-count":49,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,11,30]],"date-time":"2022-11-30T00:00:00Z","timestamp":1669766400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,11,30]],"date-time":"2022-11-30T00:00:00Z","timestamp":1669766400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,11,30]]},"DOI":"10.1109\/ecrime57793.2022.10142119","type":"proceedings-article","created":{"date-parts":[[2023,6,7]],"date-time":"2023-06-07T02:33:43Z","timestamp":1686105223000},"page":"1-12","source":"Crossref","is-referenced-by-count":13,"title":["Money Over Morals: A Business Analysis of Conti Ransomware"],"prefix":"10.1109","author":[{"given":"Ian W.","family":"Gray","sequence":"first","affiliation":[{"name":"New York University"}]},{"given":"Jack","family":"Cable","sequence":"additional","affiliation":[{"name":"Independent Researcher"}]},{"given":"Benjamin","family":"Brown","sequence":"additional","affiliation":[{"name":"University of Michigan"}]},{"given":"Vlad","family":"Cuiujuclu","sequence":"additional","affiliation":[{"name":"Flashpoint"}]},{"given":"Damon","family":"McCoy","sequence":"additional","affiliation":[{"name":"New York University"}]}],"member":"263","reference":[{"key":"ref13","author":"bureau","year":"2022","journal-title":"Initial access broker repurposing techniques in targeted attacks against Ukraine"},{"key":"ref12","author":"david","year":"2020","journal-title":"The Secret Life of an Initial Access Broker"},{"key":"ref15","year":"0","journal-title":"Crystal Blockchain"},{"key":"ref14","author":"stolyarov","year":"2022","journal-title":"Exposing initial access broker with ties to Conti"},{"key":"ref11","first-page":"25","article-title":"Cybercrime is (often) boring: Maintaining the infrastructure of cybercrime economies","author":"collier","year":"0"},{"key":"ref10","year":"2020","journal-title":"Human-operated ransomware attacks A preventable disaster"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.6562484"},{"key":"ref16","author":"krebs","year":"2022","journal-title":"Conti ransomware group diaries part i Evasion"},{"key":"ref19","article-title":"The menlo report: Ethical principles guiding information and communication technology research","author":"dittrich","year":"0"},{"key":"ref18","year":"2020","journal-title":"WIZARD SPIDER Update Resilient Reactive and Resolute"},{"key":"ref46","year":"2021","journal-title":"Conti Ransomware Nets at Least $25 5 Million in Four Months"},{"key":"ref45","author":"cong","year":"2022","journal-title":"An Anatomy of Crypto-Enabled Cybercrimes"},{"key":"ref48","year":"2022","journal-title":"GOLD ULRICK Leaks Reveal Organizational Structure and Relationships"},{"key":"ref47","year":"2022","journal-title":"Analysis of conti leaks"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39884-1_2"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39884-1_4"},{"key":"ref44","article-title":"Ransomware payments in the bitcoin ecosystem","volume":"abs 1804 4080","author":"paquet-clouston","year":"2018","journal-title":"CoRR"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/2896384"},{"key":"ref49","year":"2022","journal-title":"Leaks of Conti Ransomware Group Paint Picture of a Surprisingly Normal Tech Start-Up Sort Of"},{"key":"ref8","author":"abrams","year":"2020","journal-title":"Ryuk successor Conti Ransomware releases data leak site"},{"key":"ref7","author":"abrams","year":"2019","journal-title":"Allied Universal Breached by Maze Ransomware Stolen Data Leaked"},{"key":"ref9","author":"baker","year":"2022","journal-title":"Ransomware as a Service (RaaS) Explained | CrowdStrike"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2017.7945052"},{"key":"ref3","author":"lyngaas","year":"2022","journal-title":"I can fight with a keyboard&#x2019; How one Ukrainian IT specialist exposed a notorious Russian ransomware gang"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00047"},{"key":"ref5","first-page":"24","article-title":"Framing Dependencies Introduced by Underground Commoditization","author":"thomas","year":"0"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/PASSAT\/SocialCom.2011.79"},{"key":"ref35","article-title":"Digital drift and the &#x201C;sense of injustice","author":"holt","year":"2019","journal-title":"Counter-productive policing of youth cybercrime&#x201D;"},{"key":"ref34","year":"2021","journal-title":"Malwarehunterteam on Twitter"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1177\/1477370819887305"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.4324\/9780429460593"},{"key":"ref31","year":"2021","journal-title":"Russian National Extradited to United States to Face Charges for Alleged Role in Cybercriminal Organization"},{"key":"ref30","year":"2021","journal-title":"Latvian National Charged for Alleged Role in Transnational Cybercrime Organization"},{"key":"ref33","year":"2021","journal-title":"After Ransomware Ads Are Banned On Cybercrime Forums Alternative Platforms Being Used to Advertise and Recruit"},{"key":"ref32","year":"2021","journal-title":"Remarks by President Biden on the Colonial Pipeline Incident"},{"key":"ref2","year":"0","journal-title":"LockBit Conti and BlackCat Lead Pack Amid Rise in Active RaaS and Extortion Groups Ransomware in Q1 2022 - Security News"},{"key":"ref1","article-title":"As Ransomware Payments Continue to Grow, So Too Does Ransomware&#x2019;s Role in Geopolitical Conflict","year":"2022","journal-title":"en-US"},{"key":"ref39","year":"2023","journal-title":"United States and United Kingdom Sanction Members of Russia-Based Trickbot Cybercrime Gang"},{"key":"ref38","year":"0","journal-title":"Conti &#x2013; Rewards For Justice"},{"key":"ref24","year":"0","journal-title":"Coindesk API"},{"key":"ref23","year":"0","journal-title":"Blockchain Data API"},{"key":"ref26","year":"0","journal-title":"Frequently asked questions"},{"key":"ref25","author":"oosthoek","year":"2022","journal-title":"A Tale of Two Markets Investigating the Ransomware Payments Economy"},{"key":"ref20","author":"howell o\u2019neill","year":"2017","journal-title":"Why Jabber reigns across the Russian cybercrime underground"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.2307\/2529549"},{"key":"ref21","author":"faithfull","year":"2022","journal-title":"Russian prison culture and slang on cybercriminal forums Can you cram on the hairdryer? | Digital Shadows"},{"key":"ref28","author":"baydakova","year":"2021","journal-title":"Here&#x2019;s what we know about suex the first crypto firm sanctioned by us"},{"key":"ref27","year":"0","journal-title":"Wizard spider"},{"key":"ref29","year":"2022","journal-title":"TRM Analysis Corroborates Suspected Ties Between Conti and Ryuk Ransomware Groups and Wizard Spider | TRM Insights"}],"event":{"name":"2022 APWG Symposium on Electronic Crime Research (eCrime)","location":"Boston, MA, USA","start":{"date-parts":[[2022,11,30]]},"end":{"date-parts":[[2022,12,2]]}},"container-title":["2022 APWG Symposium on Electronic Crime Research (eCrime)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10141986\/10142077\/10142119.pdf?arnumber=10142119","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,26]],"date-time":"2023-06-26T17:57:23Z","timestamp":1687802243000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10142119\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,30]]},"references-count":49,"URL":"https:\/\/doi.org\/10.1109\/ecrime57793.2022.10142119","relation":{},"subject":[],"published":{"date-parts":[[2022,11,30]]}}}