|
[1] GReAT: Wannacry ransomware used in widespread attacks all over the world (May 2017). https://securelist.com/wannacry-ransomware-used-in-widespread-attacks-all-over-the-world/78351/.
[2] Tarun Trivedi, Vinod Parihar, Manas Khatua, and B. M. Mehtre. Threat intelligence analysis of onion websites using sublinks and keywords. In Ajith Abraham, Paramartha Dutta, Jyotsna Kumar Mandal, Abhishek Bhattacharya, and Soumi Dutta, editors, Emerging Technologies in Data Mining and Information Security, pages 567–578, Singapore, 2019. Springer Singapore.
[3] Wikipedia: Ransomware. https://en.wikipedia.org/wiki/Ransomware.
[4] Wikipedia: Wannacry ransomware attack. https://en.wikipedia.org/wiki/WannaCry_ransomware_attack.
[5] Wikipedia: Tor. https://en.wikipedia.org/wiki/Tor_(anonymity_network).
[6] Wikipedia: Dark web. https://en.wikipedia.org/wiki/Dark_web.
[7] Wikipedia: Google Trends. https://en.wikipedia.org/wiki/Google_Trends.
[8] P. H. O’neill: Bank thieves are using tor to hide their malware (Jun 2015). https://www.dailydot.com/crime/bank-malware-tor2web/.
[9] Dennis Brown: Resilient botnet command and control with tor (Jul 2010). https://www.defcon.org/images/defcon-18/dc-18-presentations/D.Brown/DEFCON-18-Brown-TorCnC.pdf.
[10] Derek Hutzler: Malware spread via tor exit node (Dec 2014). https://www.opswat.com/blog/malware-spread-tor-exit-node.
[11] Tianjun Fu, Ahmed Abbasi, and Hsinchun Chen. A focused crawler for dark web forums. In Journal of the American Society for Information Science and Technology, volume 61, pages 1213–1231, New York, NY, USA, June 2010. John Wiley & Sons, Inc.
[12] Clement Guitton. A review of the available content on tor hidden services: The case against further development. In Computers in Human Behavior, volume 29, pages 2805–2815, Amsterdam, The Netherlands, The Netherlands, November 2013. Elsevier Science Publishers B. V.
[13] Yuki Kawaguchi, Akira Yamada, and Seiichi Ozawa. Ai web-contents analyzer for monitoring underground marketplace. In Derong Liu, Shengli Xie, Yuanqing Li, Dongbin Zhao, and El-Sayed M. El-Alfy, editors, Neural Information Processing, pages 888–896, Cham, 2017. Springer International Publishing.
[14] Wikipedia: Eternalblue. https://en.wikipedia.org/wiki/EternalBlue. |