Virtual Library

Our virtual library is an online repository of all of the reports, papers, and briefings that IST has produced, as well as works that have influenced our thinking.

Submit your Content

Reports

Mapping Threat Actor Behavior in the Ransomware Payment Ecosystem: A Mini-Pilot

Zoë Brammer

viewpdf

Reports

May 2023 Progress Report: Ransomware Task Force: Gaining Ground

Ransomware Task Force

viewpdf

Reports

Castles Built on Sand: Towards Securing the Open-Source Software Ecosystem

Zoë Brammer, Silas Cutler, Marc Rogers, Megan Stifel

viewpdf

Reports

Cyber Incident Reporting Framework: Global Edition

Cyber Threat Alliance, Institute for Security and Technology

viewpdf

Reports

AI-NC3 Integration in an Adversarial Context: Strategic Stability Risks and Confidence Building Measures

Alexa Wehsener, Andrew W. Reddie, Leah Walker, Philip Reiner

viewpdf

Op-ed

The Nuclear Risk Reduction Approach: A Useful Path Forward for Crisis Mitigation

Sylvia Mishra

view

Reports

Nuclear Crisis Communications: Mapping Risk Reduction Implementation Pathways

Sylvia Mishra

viewpdf

Contribute to our Library!

We also welcome additional suggestions from readers, and will consider adding further resources as so much of our work has come through crowd-sourced collaboration already. If, for any chance you are an author whose work is listed here and you do not wish it to be listed in our repository, please, let us know.

SUBMIT CONTENT

May 2023 Progress Report: Ransomware Task Force: Gaining Ground

Ransomware Task Force

SUMMARY

Two years after publishing Combating Ransomware: A Comprehensive Framework for Action, we have seen impressive moves by industry, U.S., and partner governments toward implementing the initial 48 recommendations. In particular, we have seen continued commitment to combat this threat through the following actions: 

  • Increasing public-private and government-to-government collaboration on disruptive activity
  • Increasing focus on reporting and information sharing
  • Ongoing efforts to reduce some of the risks posed by cryptocurrency

We have also seen significant change across the ransomware landscape. Governments have taken action to prioritize ransomware defenses and investigations; victims have changed their responses; and threat actors have evolved, not only in terms of who they affiliate with, but also in terms of their tactics and the size and geographic location of their targets. 

This report walks readers through the RTF’s second year, acknowledging tremendous shifts in the ecosystem, especially in light of the war in Ukraine, and highlights key areas of progress. Whereas last year’s progress report captured the early wins of an anti-ransomware campaign, this year we grappled with the more elusive goal of sustaining success against evolving challenges. 

Lastly, this report also outlines areas to watch in the next year, including:

  • Sustaining focus on collecting and sharing ransomware data
  • Improving baseline cybersecurity across the ecosystem
  • Reexamining existing incentive structures
download pdf