{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T13:14:02Z","timestamp":1771074842604,"version":"3.50.1"},"reference-count":19,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer"],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1109\/mc.2021.3126529","type":"journal-article","created":{"date-parts":[[2022,3,15]],"date-time":"2022-03-15T19:41:40Z","timestamp":1647373300000},"page":"11-13","source":"Crossref","is-referenced-by-count":6,"title":["Ransomware: Pay to Play?"],"prefix":"10.1109","volume":"55","author":[{"given":"Nir","family":"Kshetri","sequence":"first","affiliation":[{"name":"University of North Carolina, Greensboro"}]},{"given":"Jeffrey","family":"Voas","sequence":"additional","affiliation":[{"name":"IEEE Fellow"}]}],"member":"263","reference":[{"key":"ref10","author":"val\u00e9ry","year":"2017","journal-title":"Exagrid pays $2 6m to Conti ransomware attackers"},{"key":"ref11","author":"lopatto","year":"2021","journal-title":"Ransomware funds more ransomware &#x2014; how do we stop it?"},{"key":"ref12","year":"2021","journal-title":"15% of all ransomware payments made in 2020 carried a risk of sanctions violations"},{"key":"ref13","author":"matthew","year":"2021","journal-title":"OFAC updates guidance on ransomware payments and sanctions risk"},{"key":"ref14","year":"2021","journal-title":"15% of all ransomware payments made in 2020 carried a risk of sanctions violations"},{"key":"ref15","author":"javers","year":"2021","journal-title":"The extortion economy Inside the shadowy world of Ransomware payouts"},{"key":"ref16","author":"sharwood","year":"2021","journal-title":"REvil customers complain ransomware gang uses backdoors to filch ransoms"},{"key":"ref17","year":"2021","journal-title":"Client alert Ransomware &#x2013; To pay or not to pay?"},{"key":"ref18","author":"demboski","year":"2021","journal-title":"Why the FBI&#x2019;s recovery of colonial pipeline ransom signals hope for the future"},{"key":"ref19","author":"bingjoseph","year":"2021","journal-title":"U S seizes $2 3 mln in bitcoin paid to Colonial Pipeline hackers"},{"key":"ref4","author":"carmack","year":"2019","journal-title":"What we know about DarkSide the Russian Hacker Group that just wreaked havoc on the East Coast"},{"key":"ref3","author":"mehrotra","year":"2021","journal-title":"CNA financial paid $40 million in ransom after March cyberattack"},{"key":"ref6","author":"chang","year":"2021","journal-title":"One of the biggest US insurance companies reportedly paid hackers $40 million ransom after a cyberattack"},{"key":"ref5","author":"graham","year":"2021","journal-title":"Average ransomware payouts shoot up 171% to over $300 000"},{"key":"ref8","author":"gerrit","year":"2021","journal-title":"The anatomy of a ransomware attack"},{"key":"ref7","author":"waldman","year":"2021","journal-title":"10 of the biggest ransomware attacks of 2021 - so far"},{"key":"ref2","author":"whitney","year":"2021","journal-title":"Ransomware attackers are now using triple extortion tactics"},{"key":"ref1","author":"nakashima","year":"2021","journal-title":"U S aims to thwart ransomware attacks by cracking down on crypto payments"},{"key":"ref9","author":"abrams","year":"2021","journal-title":"DarkSide ransomware gang returns as new BlackMatter operation"}],"container-title":["Computer"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/2\/9734242\/09734263.pdf?arnumber=9734263","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,19]],"date-time":"2022-05-19T20:23:43Z","timestamp":1652991823000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9734263\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3]]},"references-count":19,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/mc.2021.3126529","relation":{},"ISSN":["0018-9162","1558-0814"],"issn-type":[{"value":"0018-9162","type":"print"},{"value":"1558-0814","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3]]}}}