{"id":"https://openalex.org/W4283804541","doi":"https://doi.org/10.23919/cycon55549.2022.9811074","title":"\u2018Releasing the Hounds?\u2019<sup>1</sup> Disruption of the Ransomware Ecosystem Through Offensive Cyber Operations","display_name":"\u2018Releasing the Hounds?\u2019<sup>1</sup> Disruption of the Ransomware Ecosystem Through Offensive Cyber Operations","publication_year":2022,"publication_date":"2022-05-31","ids":{"openalex":"https://openalex.org/W4283804541","doi":"https://doi.org/10.23919/cycon55549.2022.9811074"},"language":"en","primary_location":{"id":"doi:10.23919/cycon55549.2022.9811074","is_oa":false,"landing_page_url":"https://doi.org/10.23919/cycon55549.2022.9811074","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 14th International Conference on Cyber Conflict: Keep Moving! (CyCon)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5040493765","display_name":"Michael Batrla","orcid":null},"institutions":[{"id":"https://openalex.org/I21449261","display_name":"Masaryk University","ror":"https://ror.org/02j46qs45","country_code":"CZ","type":"education","lineage":["https://openalex.org/I21449261"]}],"countries":["CZ"],"is_corresponding":true,"raw_author_name":"Michael Batrla","raw_affiliation_strings":["Masaryk University,Faculty of Law,Brno,Czech Republic","Faculty of Law, Masaryk University, Brno, Czech Republic"],"affiliations":[{"raw_affiliation_string":"Masaryk University,Faculty of Law,Brno,Czech Republic","institution_ids":["https://openalex.org/I21449261"]},{"raw_affiliation_string":"Faculty of Law, Masaryk University, Brno, Czech Republic","institution_ids":["https://openalex.org/I21449261"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086310558","display_name":"Jakub Hara\u0161ta","orcid":"https://orcid.org/0000-0002-5722-0325"},"institutions":[{"id":"https://openalex.org/I21449261","display_name":"Masaryk University","ror":"https://ror.org/02j46qs45","country_code":"CZ","type":"education","lineage":["https://openalex.org/I21449261"]}],"countries":["CZ"],"is_corresponding":false,"raw_author_name":"Jakub Harasta","raw_affiliation_strings":["Masaryk University,Faculty of Law,Brno,Czech Republic","Faculty of Law, Masaryk University, Brno, Czech Republic"],"affiliations":[{"raw_affiliation_string":"Masaryk University,Faculty of Law,Brno,Czech Republic","institution_ids":["https://openalex.org/I21449261"]},{"raw_affiliation_string":"Faculty of Law, Masaryk University, Brno, Czech Republic","institution_ids":["https://openalex.org/I21449261"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5040493765"],"corresponding_institution_ids":["https://openalex.org/I21449261"],"apc_list":null,"apc_paid":null,"fwci":0.4462,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.56994775,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"93","last_page":"115"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9147999882698059,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9147999882698059,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ransomware","display_name":"Ransomware","score":0.7850760221481323},{"id":"https://openalex.org/keywords/offensive","display_name":"Offensive","score":0.7455445528030396},{"id":"https://openalex.org/keywords/ecosystem","display_name":"Ecosystem","score":0.4692041277885437},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.44331327080726624},{"id":"https://openalex.org/keywords/chemistry","display_name":"Chemistry","score":0.4010313153266907},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.37020671367645264},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.3294513523578644},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.16306620836257935},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.16220343112945557},{"id":"https://openalex.org/keywords/operations-research","display_name":"Operations research","score":0.0902579128742218},{"id":"https://openalex.org/keywords/ecology","display_name":"Ecology","score":0.08571204543113708},{"id":"https://openalex.org/keywords/biology","display_name":"Biology","score":0.07552587985992432}],"concepts":[{"id":"https://openalex.org/C2777667771","wikidata":"https://www.wikidata.org/wiki/Q926331","display_name":"Ransomware","level":3,"score":0.7850760221481323},{"id":"https://openalex.org/C176856949","wikidata":"https://www.wikidata.org/wiki/Q2001676","display_name":"Offensive","level":2,"score":0.7455445528030396},{"id":"https://openalex.org/C110872660","wikidata":"https://www.wikidata.org/wiki/Q37813","display_name":"Ecosystem","level":2,"score":0.4692041277885437},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44331327080726624},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.4010313153266907},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.37020671367645264},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3294513523578644},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.16306620836257935},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.16220343112945557},{"id":"https://openalex.org/C42475967","wikidata":"https://www.wikidata.org/wiki/Q194292","display_name":"Operations research","level":1,"score":0.0902579128742218},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.08571204543113708},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.07552587985992432}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/cycon55549.2022.9811074","is_oa":false,"landing_page_url":"https://doi.org/10.23919/cycon55549.2022.9811074","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 14th International Conference on Cyber Conflict: Keep Moving! (CyCon)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320335322","display_name":"European Regional Development Fund","ror":"https://ror.org/00k4n6c32"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W1568520348","https://openalex.org/W3201228709","https://openalex.org/W3214407891","https://openalex.org/W3194113117","https://openalex.org/W4287020359","https://openalex.org/W3213194066","https://openalex.org/W268355439","https://openalex.org/W2962911305","https://openalex.org/W4224941017"],"abstract_inverted_index":{"Ransomware":[0],"groups":[1,151,175],"represent":[2],"a":[3,42,47,180,204,236],"significant":[4],"cyber":[5,51,59,65,113,127,136,156,160,198,240],"threat":[6,45,63],"to":[7,21,24,38,202],"Western":[8],"states.":[9],"Most":[10],"high-end":[11],"ransomware":[12,40,69,150,174,246],"actors":[13],"reside":[14],"in":[15,212,222,224,260],"territorial":[16],"safe-haven":[17],"jurisdictions":[18],"and":[19,34,78,96,110,148,189,215,218,263],"prove":[20],"be":[22,153,203],"resistant":[23],"traditional":[25],"law":[26,169],"enforcement":[27,170],"activities.":[28],"This":[29],"has":[30],"prompted":[31],"public":[32],"sector":[33],"cybersecurity":[35],"industry":[36],"leaders":[37],"perceive":[39],"as":[41],"national":[43],"security":[44],"requiring":[46],"whole-of-government":[48,214],"approach,":[49],"including":[50,132],"operations.":[52,157,171],"In":[53,158],"this":[54],"paper,":[55],"we":[56,72,119,182],"investigate":[57],"whether":[58],"operations":[60,66,82,114,128,137,161,199,241],"or":[61,177,253],"the":[62,68,74,86,90,93,107,111,124,130,213,225,233,269],"of":[64,76,80,92,106,126],"influence":[67,77,125],"ecosystem.":[70,87],"Subsequently,":[71],"assess":[73],"vectors":[75],"characteristics":[79],"past":[81],"that":[83,143],"have":[84,115],"disrupted":[85,154],"We":[88,141],"describe":[89],"specifics":[91],"ransomware-as-a-service":[94],"system":[95],"provide":[97],"three":[98],"case":[99],"studies":[100],"(DarkSide/BlackMatter,":[101],"REvil,":[102],"Conti)":[103],"highly":[104,146],"representative":[105],"current":[108],"ecosystem":[109],"effect":[112],"on":[116,129,168],"it.":[117],"Additionally,":[118],"present":[120],"initial":[121],"observations":[122],"about":[123],"system,":[131],"best":[133],"practices":[134],"from":[135],"against":[138],"non-state":[139],"groups.":[140],"conclude":[142],"even":[144,163,220],"professional,":[145],"skilled,":[147],"top-performing":[149],"can":[152,162],"through":[155],"fact,":[159],"bypass":[164],"some":[165],"limits":[166],"imposed":[167],"Even":[172],"when":[173],"rebrand":[176],"resurface":[178],"after":[179],"hiatus,":[181],"suggest":[183],"their":[184],"infrastructure":[185],"(both":[186],"technical,":[187],"human,":[188],"reputational)":[190],"will":[191],"still":[192],"suffer":[193],"mid-to":[194],"long-term":[195],"disruption.":[196],"Although":[197],"are":[200,208],"unlikely":[201],"silver":[205],"bullet,":[206],"they":[207],"an":[209],"essential":[210],"tool":[211],"multinational":[216],"efforts":[217],"may":[219],"grow":[221],"importance":[223],"next":[226],"several":[227],"years.":[228],"<sup":[229],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[230],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">1</sup>":[231],"\u2018Releasing":[232],"hounds\u2019":[234],"is":[235,258],"term":[237],"for":[238],"offensive":[239],"aimed":[242],"at":[243],"disrupting":[244],"global":[245],"gangs,":[247],"especially":[248],"those":[249],"conducted":[250],"by":[251],"militaries":[252],"intelligence":[254],"agencies.":[255],"First":[256],"use":[257],"found":[259],"Patrick":[261],"Gray":[262],"Adam":[264],"Boileau,":[265],"\u2018Feature":[266],"Podcast:":[267],"Releasing":[268],"Hounds":[270],"with":[271],"Bobby":[272],"Chesney\u2019,":[273],"Risky":[274],"Business,":[275],"28":[276],"May":[277],"2020,":[278],"https://risky.biz/HF6/.":[279]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
