The Evolution of Ransomware: In-Depth Analysis of Threat Development and Modern Defense Mechanisms

[{“box”:0,”content”:”n[if 992 equals=”Open Access”]n

n

n

n

Open Access

nn

n

n[/if 992]n[if 2704 equals=”Yes”]n

n

Notice

nThis is an unedited manuscript accepted for publication and provided as an Article in Press for early access at the author’s request. The article will undergo copyediting, typesetting, and galley proof review before final publication. Please be aware that errors may be identified during production that could affect the content. All legal disclaimers of the journal apply.n

n[/if 2704]n

n

Year : 2025 [if 2224 equals=””]25/09/2025 at 11:03 AM[/if 2224] | [if 1553 equals=””] Volume : 13 [else] Volume : 13[/if 1553] | [if 424 equals=”Regular Issue”]Issue : [/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] 03 | Page : 35 43

n

n

nn

n

n

n

    By

    n

    [foreach 286]n

    n

    Karishma Saini, Rohit Kumar,

    n t

  • n

    n[/foreach]

    n

n[if 2099 not_equal=”Yes”]n

    [foreach 286] [if 1175 not_equal=””]n t

  1. Student, Student, Department of Computer Applications, Echelon Institute of Technology, Faridabad, Department of Computer Applications, Echelon Institute of Technology, Faridabad, Haryana, Haryana, India, India
  2. n[/if 1175][/foreach]

n[/if 2099][if 2099 equals=”Yes”][/if 2099]n

n

Abstract

n

n

nRansomware is the most severe of all cybersecurity threats the contemporary digital world is confronted with. It is a form of malware that encrypts a victim’s information and requests ransom, usually in cryptocurrency, for its decryption. From its first appearance in the late 1980s, ransomware grew from simple malware into very advanced and targeted attacks that can be used to bring down entire organizations, businesses and critical infrastructure. This study explores the evolution of ransomware in history, following its development and expanded interference into both private and public institutions. Contemporary ransomware operations frequently utilize strategies of ransomware-as-a-service (RaaS), double extortion, and software vulnerability exploits. Increased digital reliance and poor cybersecurity measures have left institutions more exposed. The study discusses the major prevention and response measures, such as frequent data backups, employee awareness training, endpoint security, and incident response planning. It also examines the function played by cryptocurrency in facilitating anonymous payment of ransoms and mentions actions taken by governments and cybersecurity professionals to counter the threat. The case studies of Indian and foreign major ransomware attacks are outlined to highlight the practical lessons and implications. Finally, the study emphasizes the importance of ongoing innovation, reforms, global collaboration, and strong cybersecurity policies to deal with the changing ransomware threat.nn

n

n

n

Keywords: Ransomware, cybersecurity, RaaS, phishing

n[if 424 equals=”Regular Issue”][This article belongs to Journal Of Network security ]

n

[/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue under section in Journal Of Network security (jons)][/if 424][if 424 equals=”Conference”]This article belongs to Conference [/if 424]

n

n

n

How to cite this article:
nKarishma Saini, Rohit Kumar. [if 2584 equals=”][226 wpautop=0 striphtml=1][else]The Evolution of Ransomware: In-Depth Analysis of Threat Development and Modern Defense Mechanisms[/if 2584]. Journal Of Network security. 17/09/2025; 13(03):35-43.

n

How to cite this URL:
nKarishma Saini, Rohit Kumar. [if 2584 equals=”][226 striphtml=1][else]The Evolution of Ransomware: In-Depth Analysis of Threat Development and Modern Defense Mechanisms[/if 2584]. Journal Of Network security. 17/09/2025; 13(03):35-43. Available from: https://journals.stmjournals.com/jons/article=17/09/2025/view=0

nn

n

n[if 992 equals=”Open Access”]Full Text PDF[/if 992]n

n

n[if 992 not_equal=”Open Access”]n

n

n[/if 992]n

nn

nnn

n[if 379 not_equal=””]nn

Browse Figures

n

n

n[foreach 379]

figures

[/foreach]n

n

n

n[/if 379]

n

n

n

n

n

References n

n[if 1104 equals=””]n

  1. Ablon L, Libicki MC, Golay AA. Markets for cybercrime tools and stolen data: Hackers’ bazaar. USA: Rand Corporation; 2014 Mar 25.
  2. Dorobisz J. Analysis of trends and risks in the field of network security based on statistical data. GIS Odyssey J. 2024 Dec 27; 4(2): 147–63.
  3. Wang J, Ni Q, Liu G, Luo X, Jha SK. Image splicing detection based on convolutional neural network with weight combination strategy. J Inf Secur Appl. 2020 Oct 1; 54: 102523.
  4. Kävrestad J, Zaxmy J, Nohlberg M. Analyzing the usage of character groups and keyboard patterns in password creation. Inf Comput Secur. 2020 Jul 16; 28(3): 347–58.
  5. Egloff FJ, Smeets M. Sandworm: a new era of cyberwar and the hunt for the Kremlin’s most dangerous hackers: by Andy Greenberg, New York, Doubleday, 2019, xiii/348 pp.,£ 22.50 (hardback), ISBN 9780 385544405. Journal of Cyber Policy. 2020 Aug; 5(2): 1–2.
  6. Alraizza A, Algarni A. Ransomware detection using machine learning: A survey. Big Data Cogn Comput. 2023 Aug 16; 7(3): 143.
  7. Kaey TW. Navigating the Quantum Era: Exploring Lightweight Quantum-Resistant Cryptography. IC-ITECHS. 2024 Dec 2; 5(1): 586–96.
  8. Ekisa C, Briain DÓ, Kavanagh Y. Leveraging the MITRE ATT&CK Framework for Threat Identification and Evaluation in Industrial Control System Simulations. In 2024 IEEE 35th Irish Signals and Systems Conference (ISSC). 2024 Jun 13; 1–6.
  9. Singh A. From past to present: the evolution of data breach causes (2005–2025). LatIA. 2025 Mar 19; 3: 333.
  10. Shukla S, Kant R, Srivastava C, Gautam A, Yadav P. Examining the Role of Cyber-Security in Combating Economic Repercussions of Cyber-Crimes: Strategy for India. Library of Progress-Library Science, Information Technology & Computer. 2024 Jul 15; 44(3): 4618–4627.
  11. Lubin A. The law and politics of ransomware. Vand J Transnat’l L. 2022; 55(5): 1177.

nn[/if 1104][if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/if 1106]
  2. n[/foreach]

n[/if 1104]

n


nn[if 1114 equals=”Yes”]n

n[/if 1114]

n

n

[if 424 not_equal=””]Regular Issue[else]Published[/if 424] Subscription Review Article

n

n

n

n

n

Journal Of Network security

n

[if 344 not_equal=””]ISSN: 2395-6739[/if 344]

n

n

n

nn

n

[if 2146 equals=”Yes”][/if 2146][if 2146 not_equal=”Yes”][/if 2146]n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n[if 1748 not_equal=””]

[else]

[/if 1748]n

n[if 1746 equals=”Retracted”]n

n

n

n

[/if 1746]n[if 4734 not_equal=””]

n

n

n

[/if 4734]n

n

Volume 13
[if 424 equals=”Regular Issue”]Issue[/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] 03
Received 28/06/2025
Accepted 18/07/2025
Published 17/09/2025
Retracted
Publication Time 81 Days

n

n

nn


n

Login

n
My IP
n

PlumX Metrics

nn

n

n

n[if 1746 equals=”Retracted”]n

[/if 1746]nnn

nnn”}]