To read this content please select one of the options below:

A target-centric intelligence approach to WannaCry 2.0

Adam B. Turner (Department of Security Studies and Criminology, Macquarie University, Sydney, Australia)
Stephen McCombie (Department of Security Studies and Criminology, Macquarie University, Sydney, Australia)
Allon J. Uhlmann (Department of Security Studies and Criminology, Macquarie University, Sydney, Australia)

Journal of Money Laundering Control

ISSN: 1368-5201

Article publication date: 7 October 2019

860

Abstract

Purpose

This paper aims to demonstrate the utility of a target-centric approach to intelligence collection and analysis in the prevention and investigation of ransomware attacks that involve cryptocurrencies. The paper uses the May 2017 WannaCry ransomware usage of the Bitcoin ecosystem as a case study. The approach proves particularly beneficial in facilitating information sharing and an integrated analysis across intelligence domains.

Design/methodology/approach

This study conducted data collection and analysis of the component Bitcoin elements of the WannaCry ransomware attack. A note of both technicalities of Bitcoin operations and current models for sharing cyber intelligence was made. Our analysis builds on and further develops current definitions and strategies for sharing cyber threat intelligence. It uses the problem definition model (PDM) and generic target network model (TNM) to create an analytic framework for the WannaCry ransomware attack scenario, allowing analysts the ability to test their hypotheses and integrate and share data for collaborative investigation.

Findings

Using a target-centric intelligence approach to WannaCry 2.0 shows that it is possible to model the intelligence problem of collecting and analysing data related to inflows and outflows of Bitcoin-related ransomware transactions. Bitcoin transactions form graph networks and allow to build a target network model for collecting, analysing and sharing intelligence with multiple stakeholders. Although attribution and anonymity prevail under cryptocurrency usage, there is a means for developing transaction walks using this method to target nefarious cryptocurrency exchanges where criminals are inclined to cash out their proceeds of crime.

Originality/value

The application of a target-centric intelligence approach to the cryptocurrency components of a ransomware attack provides a framework for intelligence units to break down the problem in the financial domain and model the network behaviour of illicit Bitcoin transactions relating to ransomware.

Keywords

Acknowledgements

The authors wish to thank John Bambenek for his guidance on classifying ransomware attacks and Aleš Janda for the use of his https://www.walletexplorer.com API to access blockchain data.

Citation

Turner, A.B., McCombie, S. and Uhlmann, A.J. (2019), "A target-centric intelligence approach to WannaCry 2.0", Journal of Money Laundering Control, Vol. 22 No. 4, pp. 646-665. https://doi.org/10.1108/JMLC-01-2019-0005

Publisher

:

Emerald Publishing Limited

Copyright © 2019, Emerald Publishing Limited

Related articles