What happens when a leakware attacks? Please explain in context of ransomwares?

0 like 0 dislike
asked Jun 1, 2018 in technology by Anshuman (402 points)
What happens when a leakware attacks? Please explain in context of ransomwares?
commented Jan 24, 2020 by LesZown
Buy Propecia Paypal  [url=http://cialibuy.com]Buy Cialis[/url] Prix Kamagra Avec Ordonnance  <a href=http://cialibuy.com>Cialis</a> Buy Lasix Online Canada

1 Answer

0 like 0 dislike
answered Jun 1, 2018 by Anshuman (402 points)

 In a leakware attack, malware exfiltrates sensitive host data either to the attacker or alternatively, to remote instances of the malware, and the attacker threatens to publish the victim's data unless a ransom is paid. The attack was presented at West Point in 2003 and was summarized in the book Malicious Cryptography as follows, "The attack differs from the extortion attack in the following way. In the extortion attack, the victim is denied access to its own valuable information and has to pay to get it back, where in the attack that is presented here the victim retains access to the information but its disclosure is at the discretion of the computer virus".[55] The attack is rooted in game theory and was originally dubbed "non-zero sum games and survivable malware". 

Make sure your Question & Answer should be appropriate and useful to the reader. Don't just copy and paste content from other sources.
...