References
1 - Alina Simone, "The Strange History of Ransomware," March 26, 2015, Medium.com, https://medium.com/unhackable/the-bizarre-pre-internet-history-of-ransomware-bb480a652b4b.
2 - Denis Nazarov and Olga Emelyanova, "Blackmailer: the story of Gpcode," SecureList, June 26, 2006. https://securelist.com/blackmailer-the-story-of-gpcode/36089 (accessed June 6, 2019).
3 - Kevin Savage, Peter Coogan, and Hon Lau, "The Evolution of Ransomware" (whitepaper, Symantec, Mountain View, CA, August 6, 2015), 10, http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/the-evolution-of-ransomware.pdf.
4 - "CryptoLocker: What Is and How to Avoid It," Panda Security, May 14, 2015, https://www.pandasecurity.com/mediacenter/malware/cryptolocker/.
5- Savage, Coogan, and Lau, "Evolution of Ransomware," 22–25.
6- Brian Krebs, "2014: The Year Extortion Went Mainstream," Krebs on Secu
7- Rebecca Forand, "School District 'Bitcoin Hostage' Situation Continues; FBI, Homeland Security Investigating," NJ.com, March 24, 2015, http://www.nj.com/gloucester-county/index.ssf/2015/03/school_district_bitcoin_hostage_situation_continue.html.
8- Sherri Davidoff, "Cyber Alert: New Ransomware Holds Individual File Shares Hostage," LMG Security, May 16, 2018, https://lmgsecurity.com/cyber-alert-new-ransomware/.
9- Lucian Constantin, "New Ransomware Program Threatens to Publish User File," Computerworld, November 5, 2015, https://www.computerworld.com/article/3002120/security/new-ransomware-program-threatens-to-publishuser-files.html; Symantec, "2016 Internet Security Threat Report," ISTR 21 (April 2016): 58, https://www.symantec.com/content/dam/symantec/docs/reports/istr-21-2016-en.pdf.
10- Katelyn Bailey, "2016: The Year of Ransomware," Center for Internet Security (blog), 2016, https://www.cisecurity.org/blog/2016-the-year-of-ransomware/.
11- John Biggs, "LA Hospital Servers Shut Down by Ransomware," Tech Crunch, February 17, 2016, https://techcrunch.com/2016/02/17/la-hospital-servers-shut-down-by-ransomware.
12- Forand, "School District."
13- Jessica Davis, "Ransomware Rising, but Where Are All the Breach Reports?" Healthcare IT News, March 20, 2017, http://www.healthcareitnews.com/news/ransomware-rising-where-are-all-breach-reports.
14- Danny Palmer, "Ransomware 2.0: Spora Now Steals Your Credentials and Logs What You Type," ZDNet, August 24, 2017, http://www.zdnet.com/article/ransomware-2-0-spora-now-steals-your-credentials-and-logs-what-you-type.
15- U.S. Department of Health and Human Services, "Fact Sheet: Ransomware and HIPAA," accessed January 18, 2018, https://www.hhs.gov/sites/default/files/RansomwareFactSheet.pdf ?language=es.
16- Hussam A Al-Abed, "Extortion/Kidnapping Checklist," BankersOnline.com, July 21, 2003, https://www.bankersonline.com/qa/extortionkidnapping-checklist.