Ransomware Negotiation: Dynamics and Privacy-Preserving Mechanism Design
By: Haohui Zhang , Sirui Shen , Xinyu Hu and more
Potential Business Impact:
Helps stop computer hostage demands faster.
Ransomware attacks have become a pervasive and costly form of cybercrime, causing tens of millions of dollars in losses as organizations increasingly pay ransoms to mitigate operational disruptions and financial risks. While prior research has largely focused on proactive defenses, the post-infection negotiation dynamics between attackers and victims remains underexplored. This paper presents a formal analysis of attacker-victim interactions in modern ransomware incidents using a finite-horizon alternating-offers bargaining game model. Our analysis demonstrates how bargaining alters the optimal strategies of both parties. In practice, incomplete information-attackers lacking knowledge of victims' data valuations and victims lacking knowledge of attackers' reservation ransoms-can prolong negotiations and increase victims' business interruption costs. To address this, we design a Bayesian incentive-compatible mechanism that facilitates rapid agreement on a fair ransom without requiring either party to disclose private valuations. We further implement this mechanism using secure two-party computation based on garbled circuits, thereby eliminating the need for trusted intermediaries and preserving the privacy of both parties throughout the negotiation. To the best of our knowledge, this is the first automated, privacy-preserving negotiation mechanism grounded in a formal analysis of ransomware negotiation dynamics.
Similar Papers
zkRansomware: Proof-of-Data Recoverability and Multi-round Game Theoretic Modeling of Ransomware Decisions
Cryptography and Security
Lets victims get data back safely after attack.
Data Encryption Battlefield: A Deep Dive into the Dynamic Confrontations in Ransomware Attacks
Cryptography and Security
Stops computer viruses from locking your files.
Assessing and Prioritizing Ransomware Risk Based on Historical Victim Data
Cryptography and Security
Predicts who will be attacked by hackers.