References
- Ahmed, U., Lin, J. C.-W., & Srivastava, G. (2022). Mitigating adversarial evasion attacks of ransomware using ensemble learning. Computers and Electrical Engineering, 100, 107903. https://doi.org/10.1016/J.COMPELECENG.2022.107903
- Bischoff, P. (2024). On average, US schools & colleges lose $500K per day to downtime from ransomware attacks. Comparitech. https://www.comparitech.com/blog/information-security/school-ransomware-attacks/
- CISA. (2016). Protecting Your Networks from Ransomware. Cybersecurity & Infrastructure Security Agency. https://www.cisa.gov/resources-tools/resources/protecting-your-networks-ransomware
- CISA. (2022). Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA) Fact Sheet. Cybersecurity & Infrastructure Security Agency. https://www.cisa.gov/sites/default/files/2023-01/CIRCIA_07.21.2022_Factsheet_FINAL_508%20c.pdf
- CISA. (2023). JCDC Cultivates Pre-Ransomware Notification Capability. Cybersecurity & Infrastructure Security Agency. https://www.cisa.gov/news-events/alerts/2023/03/23/jcdc-cultivates-pre-ransomware-notification-capability
- Drake, V. (2022). The History and Evolution of Ransomware Attacks. Flashpoint. https://www.flashpoint.io/blog/the-history-and-evolution-of-ransomware-attacks/
- FBI IC3. (2024). Federal Bureau of Investigation Internet Crime Report 2023. Federal Bureau of Investigation (FBI) Internet Crime Complaint Center (IC3). https://www.ic3.gov/annualreport/reports/2023_ic3report.pdf
- Greenberg, A. (2019). Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin ’ s Most Dangerous Hackers. Doubleday. ISBN 978-0385544412.
- HHS. (2025). The U.S. Department of Health & Human Services. https://www.hhs.gov/
- McIntosh, T., Liu, T., Susnjak, T., Alavizadeh, H., Ng, A., Nowrozy, R., & Watters, P. (2023). Harnessing GPT-4 for generation of cybersecurity GRC policies: A focus on ransomware attack mitigation. Computers & Security, 134, article 103424. https://doi.org/10.1016/J.COSE.2023.103424
- Meurs, T., Cartwright, E., Cartwright, A., Junger, M., & Abhishta, A. (2024). Deception in double extortion ransomware attacks: An analysis of profitability and credibility. Computers & Security, 138, 103670. https://doi.org/10.1016/J.COSE.2023.103670
- Neprash, H. T., McGlave, C. C., Cross, D. A., Virnig, B. A., Puskarich, M. A., Huling, J. D., Rozenshtein, A. Z., & Nikpay, S. S. (2022). Trends in Ransomware Attacks on US Hospitals, Clinics, and Other Health Care Delivery Organizations, 2016-2021. JAMA Health Forum, 3(12), e224873. https://doi.org/10.1001/jamahealthforum.2022.4873
- Saccone, F., Melillo, P., Sgueglia, A., Di Sorbo, A., & Visaggio, C. A. (2025). The ransomware blueprint: Attack patterns and strategic variations across gangs. Journal of Information Security and Applications, 95, 104264. https://doi.org/10.1016/J.JISA.2025.104264
- Saleem, J., Islam, R., Kabir, M. A. (2022). The Anonymity of the Dark Web: A Survey. IEEE Access, 10, 33628–33660. https://doi.org/10.1109/ACCESS.2022.3161547
- Statista. (2023). Estimated amount of ransom demanded from U.S. healthcare organizations from 2019 to 2023 YTD. https://www.statista.com/statistics/1422162/us-healthcare-ransom-estimated-demanded/
- Statista. (2024). Average amount of cyber ransom payments at organizations in the United States in 2023, by industry. https://www.statista.com/statistics/1465613/average-ransom-payment-us-by-industry/
- University of Tulsa. (2024). Famous Ransomware Attacks in History. https://online.utulsa.edu/blog/famous-ransomware-attacks-in-history
- VMware. (2020). Amid COVID-19, Global Orgs See a 148% Spike in Ransomware Attacks; Finance Industry Heavily Targeted. VMware Security Blog. https://blogs.vmware.com/security/2020/04/amid-covid-19-global-orgs-see-a-148-spike-in-ransomware-attacks-finance-industry-heavily-targeted.html
- Yan, P., & Khoei, T. T. (2025). Securing the internet of things: A comprehensive review of ransomware attacks, detection, countermeasures, and future prospects. Franklin Open, 11, article 100256. https://doi.org/10.1016/J.FRAOPE.2025.100256
- Zetter, K. (2017). What Is Ransomware? A Guide to the Global Cyberattack ’ s Scary Method. Wired. https://www.wired.com/2017/05/hacker-lexicon-guide-ransomware-scary-hack-thats-rise/
