fullrecord |
[{"key": "dc.contributor.advisor", "value": "Frantti, Tapio", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Lehtoniemi, Matti", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2025-05-14T11:34:35Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2025-05-14T11:34:35Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2025", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/102005", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Ransomware-as-a-Service (RaaS) has emerged as a model that democratizes access to attack tools and enables a broader range of individuals to participate in malicious activities. This study examines how these platforms operate on the dark web, focusing on their accessibility, offerings, and business strategies by employing theory-driven content analysis on ten ransomware sites. With insights from this, the research identifies factors driving proliferation and highlights implications for developing more effective countermeasures.\nFindings reveal that RaaS platforms are not only easily accessible but are also designed with a strong emphasis on marketability. They aim to entice affiliates with professional user interfaces, features, and branding that surprisingly prioritizes trust and legitimacy over technical details. Tactics leveraged range from using victims as living proof of powerful tools to always making sure operators are available for contact. Despite this apparent openness, selective vetting processes are still incorporated to ensure that only qualified affiliates gain access, maintaining operational integrity and mitigating the risk of misuse. This balance between openness and control suggests that RaaS operators strategically curate their user base to foster a reliable and efficient network important in supporting their operations and the business model as a whole.\nThe study highlights how challenges posed by RaaS extend beyond technical vulnerabilities, encompassing economic, psychological, and sociological dimensions. This underscores the need for future defence strategies to consider the broader human factors and market dynamics in addition to the technical countermeasures previous research has largely focused on.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Kiristyshaittaohjelmapalvelut (Ransomware-as-a-Service, RaaS) ovat ty\u00f6kaluja, jotka demokratisoivat kyberrikollisuutta mahdollistamalla yh\u00e4 useamman henkil\u00f6n osallistuvan kyberhy\u00f6kk\u00e4yksiin. T\u00e4ss\u00e4 tutkimuksessa tarkastellaan miten n\u00e4m\u00e4 pime\u00e4ss\u00e4 verkossa toimivat alustat operoivat, keskittyen niiden tarjoamien haittaohjelmien saavutettavuuteen, tarjontaan ja liiketoimintastrategioihin. Tutkimusmetodina k\u00e4ytet\u00e4\u00e4n teorial\u00e4ht\u00f6ist\u00e4 sis\u00e4lt\u00f6analyysi\u00e4 kymmenen kiristyshaittaohjelmasivuston sis\u00e4ll\u00f6st\u00e4. Tuloksista voidaan tunnistaa levinneisyyteen vaikuttavia tekij\u00f6it\u00e4, sek\u00e4 niiden pohjalta arvioida mit\u00e4 t\u00e4m\u00e4 tarkoittaa vastatoimenpiteiden kannalta.\nTutkimustulokset painottavat RaaS-alustojen olevan helposti l\u00f6ydett\u00e4viss\u00e4 ja ett\u00e4 niiden suunnittelussa on selv\u00e4sti painotettu markkinoitavuutta. Alustat pyrkiv\u00e4t houkuttelemaan kumppaneita ammattimaisilla k\u00e4ytt\u00f6liittymill\u00e4, monilla erilaisilla ominaisuuksilla, sek\u00e4 tuotteistuksella, jossa etusijalla on luotettavuus yll\u00e4tt\u00e4en j\u00e4tt\u00e4en tekniset ominaisuudet syrj\u00e4\u00e4n. Markkinoinnissa hy\u00f6dynnet\u00e4\u00e4n esimerkiksi uhrien julkaisua el\u00e4v\u00e4n\u00e4 todisteena hy\u00f6kk\u00e4yskyvyist\u00e4 sek\u00e4 sit\u00e4 ett\u00e4 alustojen omistajat ovat aina saavutettavissa. Yll\u00e4tt\u00e4v\u00e4st\u00e4 avoimuudesta huolimatta kaikkia halukkaita ei oteta mukaan kumppaniksi, vaan alustoilla on k\u00e4yt\u00f6ss\u00e4 prosesseja jotka yll\u00e4pit\u00e4v\u00e4t toiminnan eheytt\u00e4 ja v\u00e4hent\u00e4v\u00e4t v\u00e4\u00e4rink\u00e4yt\u00f6n riski\u00e4. Avoimuuden ja kumppanien rajauksen tasapaino onkin oikeastaan merkki siit\u00e4 miten operaattorit valikoivat k\u00e4ytt\u00e4j\u00e4ns\u00e4 pyrkien edist\u00e4m\u00e4\u00e4n luotettavuutta ja tehokkuutta jotka ovat t\u00e4rkeit\u00e4 liiketoimintamallin tukemisessa.\nTuloksien pohjalta voidaan p\u00e4\u00e4tell\u00e4 ett\u00e4 tulevaisuuden puolustusstrategioissa on otettava teknisten toimien lis\u00e4ksi tarkemmin huomioon my\u00f6s inhimilliset tekij\u00e4t ja markkinoiden dynamiikka. Kiristyshaittaohjelmien taustalla vaikuttaa selv\u00e4sti taloudellisia, psykologisia, ja sosiaalisia tekij\u00f6it\u00e4, joista kaikki on otettava huomioon tulevaisuuden tutkimuksessa teknisten tekij\u00f6iden lis\u00e4ksi.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2025-05-14T11:34:35Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2025-05-14T11:34:35Z (GMT). No. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "94", "language": null, "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "eng", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "CC BY 4.0", "language": null, "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.title", "value": "Exploring Factors Affecting Ransomware-as-a-Service Proliferation", "language": null, "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202505144248", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuuden maisteriohjelma", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Master's Degree Programme in Cyber Security", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.copyright", "value": "\u00a9 The Author(s)", "language": null, "element": "rights", "qualifier": "copyright", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://creativecommons.org/licenses/by/4.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.description.accessibilityfeature", "value": "unknown accessibility", "language": "en", "element": "description", "qualifier": "accessibilityfeature", "schema": "dc"}, {"key": "dc.description.accessibilityfeature", "value": "ei tietoa saavutettavuudesta", "language": "fi", "element": "description", "qualifier": "accessibilityfeature", "schema": "dc"}]
|