Ransomware Negotiation: Dynamics and Privacy-Preserving Mechanism Design

📅 2025-08-19
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
Ransomware negotiation dynamics remain understudied, and existing defenses neglect strategic interactions between attackers and victims post-infection. Method: We introduce the first finite-horizon alternating-offer bargaining game model to formally characterize optimal negotiation strategies under incomplete information; we then design a Bayesian incentive-compatible, privacy-preserving negotiation mechanism—requiring no trusted third party or disclosure of private valuations. The mechanism employs garbled circuits to realize secure two-party computation, preserving the privacy of both parties’ valuations. Contribution/Results: Our automated framework significantly reduces negotiation duration and victim business-interruption costs. It provides a verifiable, deployable, game-theoretic paradigm for ransomware governance—grounded in rigorous modeling of adversarial incentives and cryptographic privacy guarantees. Experimental evaluation confirms its efficacy in balancing efficiency, strategic robustness, and confidentiality.

Technology Category

Application Category

📝 Abstract
Ransomware attacks have become a pervasive and costly form of cybercrime, causing tens of millions of dollars in losses as organizations increasingly pay ransoms to mitigate operational disruptions and financial risks. While prior research has largely focused on proactive defenses, the post-infection negotiation dynamics between attackers and victims remains underexplored. This paper presents a formal analysis of attacker-victim interactions in modern ransomware incidents using a finite-horizon alternating-offers bargaining game model. Our analysis demonstrates how bargaining alters the optimal strategies of both parties. In practice, incomplete information-attackers lacking knowledge of victims' data valuations and victims lacking knowledge of attackers' reservation ransoms-can prolong negotiations and increase victims' business interruption costs. To address this, we design a Bayesian incentive-compatible mechanism that facilitates rapid agreement on a fair ransom without requiring either party to disclose private valuations. We further implement this mechanism using secure two-party computation based on garbled circuits, thereby eliminating the need for trusted intermediaries and preserving the privacy of both parties throughout the negotiation. To the best of our knowledge, this is the first automated, privacy-preserving negotiation mechanism grounded in a formal analysis of ransomware negotiation dynamics.
Problem

Research questions and friction points this paper is trying to address.

Analyzing ransomware negotiation dynamics between attackers and victims
Addressing incomplete information issues prolonging ransomware negotiations
Designing privacy-preserving automated mechanism for ransom agreement
Innovation

Methods, ideas, or system contributions that make the work stand out.

Bayesian incentive-compatible mechanism design
Secure two-party computation implementation
Garbled circuits for privacy preservation
🔎 Similar Papers
No similar papers found.
H
Haohui Zhang
University of Twente, Drienerlolaan 5, Enschede, The Netherlands
S
Sirui Shen
Centrum Wiskunde & Informatica, Science Park 123, Amsterdam, The Netherlands
X
Xinyu Hu
University of Twente, Drienerlolaan 5, Enschede, The Netherlands
Chenglu Jin
Chenglu Jin
CWI Amsterdam
Hardware SecurityCyber-Physical System SecurityApplied Cryptography