*Perspective Chapter: Ransomware DOI: http://dx.doi.org/10.5772/intechopen.108433*

2019. Available from: https://www. crowdstrike.com/blog/sin-ful-spiderswizard-spider-and-lunar-spider-sharingthe-same-web/ [Accessed: September 17, 2022]

[14] Hanel A. Big Game Hunting with Ryuk: Another Lucrative Targeted Ransomware [Internet]. 2019. Available from: https://www.crowdstrike.com/ blog/big-game-hunting-with-ryukanother-lucrative-targeted-ransomware/ [Accessed: September 17, 2022]

[15] Sood K, Hurley S, Arsene L. Dark Side Goes Dark: How Crowd Strike Falcon Customers Were Protected [Internet]. 2021. Available from: https:// www.crowdstrike.com/blog/falconprotects-from-darkside-ransomware/ [Accessed: September 17, 2022]

[16] Osborne C. Dark Side explained: The ransomware group responsible for Colonial Pipeline attack [Internet]. 2019. Available from: https://www.zdnet. com/article/darkside-the-ransomwaregroup-responsible-for-colonial-pipelinecyberattack-explained/ [Accessed: September 17, 2022]

[17] Meyers A. The Evolution of PINCHY SPIDER from Gand Crab to REvil [Internet]. 2021. Available from: https://www.crowdstrike.com/blog/ the-evolution-of-revil-ransomware-andpinchy-spider/ [Accessed: September 17, 2022]

[18] Elsad A, Gumarin JR, Barr A. LockBit 2.0: How This RaaS Operates and How to Protect Against It [Internet]. 2022. Available from: https://unit42. paloaltonetworks.com/lockbit-2 ransomware/ [Accessed: September 18, 2022]

[19] Elsad A. Threat Assessment: BlackByte Ransomware [Internet]. 2022. Available from: https://unit42. paloaltonetworks.com/blackbyteransomware/ [Accessed: September 19, 2022]

[20] Liska A, Gallo T. Ransomware. OReilly; 2016. pp. 53-55. ISBN: 978-1-491-96788-1

[21] Berrueta E, Morato D, Magana E, Izal M. A Survey on Detection Techniques for Cryptographic Ransomware. IEEE; 2019. DOI: 10.1109/ ACCESS.2019.2945839

[22] Hills M, editor. Why Cyber Security Is a Socio-Technical Challenge: New Concepts and Practical Measures to Enhance Detection. Nova; 2016. p. 188. ISBN: 978-1-53610-090-7

[23] Hassan A. Ransomware Revealed. Apress; 2009. 209 p. DOI: 10.1007/9781484242551

Section 4
