Request Information

Request Information

or Call 1.877.459.4347
What is Ransomware and how does it work?

What is Ransomware?

Topics Covered in this Ransomware whitepaper:

  • How does Ransomware work?
  • How much do Ransomware Attacks Cost?
  • Early Ransomware Attacks
  • Notorious Ransomware Attacks
  • Why Business Need to be Protected from Ransomware
  • Why Antivirus Programs don’s stop Ransomware Attacks
  • What to do if you get Attacked
  • How to stop Ransomware Attacks from Occuring

Ransomware is a thriving marketplace plaguing individuals and businesses alike. It is a malicious and sophisticated malware attack that leverages a computer virus designed to hold a user’s data hostage. While ransomware is not a new technique, it has become increasingly notorious in recent years. Once imagined to be one clever hacker operating from his basement, it has now grown into a booming business.

Ransomware attacks are becoming more prevalent for several reasons. One is that most people today are incredibly dependent on their computers, with precious photos, important files, and more stored on them and are therefore willing to pay to get lost files back. And, in the case of businesses, most literally cannot afford to be locked out of their computers or files for any significant period of time. Considering that ransomware can spread to other PCs connected to a local network, it can be particularly catastrophic for businesses.

Another reason is simply that more and more people are able to access the ability to create and launch a ransomware attack. With the opportunity to become a lucrative business, there’s plenty of incentive to get into it.

There are two basic different types of ransomware. The first is locker ransomware, which locks the user out of their entire system and only unlocks it when the creator receives the ransom he has demanded. The other type is encrypting ransomware, which encrypts the user’s files and where the creator demands a ransom from the victim in exchange for a decrypting key.

How does Ransomware work?

As its name indicates, Ransomware works just like a kidnapping, except that you are paying the ransom for your data instead of for a loved one.

There are several different methods hackers use to launch their ransomware. It often begins when the cybercriminal behind the act designs an email that looks convincingly like a real email, such as a UPS package tracking email that baits the user to click a URL. When the user clicks the link, it launches malware that infects his computer with a virus. Alternately, when users unknowingly visit a compromised or malicious website, ransomware can be downloaded onto their systems. Additionally, it can be spread via infected software apps or infected external storage devices.

This virus then locks or encrypts everything on the user’s computer hard drive, literally locking the user out of all the files on the computer. The user is notified by a screen popping up that informs him that his files will all be destroyed unless he pays a ransom through an online payment to get access to a decrypt key.

Typically, the ransom is made with a specific deadline and if the victim goes past the deadline without paying, either the ransom will increase, or the user’s data is permanently destroyed.

It has become much more prevalent in recent years thanks to the dark web, which has made it possible for people even with very limited technical experience to get their hands on kits known as ransomware as a service (RaaS). Basically, just about anyone can create and launch a ransomware attack if they know where to look for RaaS.

Cybercriminals enjoy the challenge and the thrill of their malicious activities. But, layer on the fact that they can make fast, easy cash and it’s clear that ransomware isn’t going away anytime soon.

How much do Ransomware Attacks Cost?

According to Symantec, the amount of ransom demanded in 2017 was nearly three times what it was in 2016, averaging $1,077. The cybercriminals responsible for these attacks most commonly demand payment via cryptocurrency such as Bitcoin, though some other payment methods include Amazon and iTunes gift cards.

However, paying the ransom doesn’t always guarantee you’ll get your decryption key. In fact, a 2016 Kaspersky Security Bulletin indicates that 20 percent of companies that paid a ransom in response to an attack never recovered their files.

Early Ransomware Attacks

According to Symantec, the first known ransomware attack called AIDS Trojan occurred in 1989 for a payment of $189 and was spread via shared floppy discs. It was created and distributed by biologist Dr. Joseph Popp, who claimed to be using the funds collected to fund AIDS research.

In Russia, cases of ransomware attacks began to occur in 2005. In these early years, ransomware was mostly focused on encrypting the most commonly used file types such as  .PDF, .DOC, .XLS, .JPG. While ransomware attacks originally were prevalent in Russia, they soon moved into Europe before the infections began to spread across North America.

The first ransomware strand to use RSA encryption in the mid-’00s was called Archiveus. Very difficult to decode, an RSA encrypted file requires a specific alpha-numeric string of digits to unlock.

Some Notorious Ransomware Attacks

Reveton

In the early ’10s, a type of ransomware known as Reveton, or “Police Ransomware” packages hit the scene. These police trojans impersonated law enforcement agencies with notification pages informing the victims that they were caught doing illicit activities online and demanded the payment of “fines”. Reveton tracked the geolocation of its victims in order to know which local law enforcement agency to impersonate.

CryptoLocker

Named after its ability to encrypt files as well as lock the files, CryptoLocker appeared in 2013. At its peak, CryptoLocker was infecting about 150,000 victims monthly.

This threat was powerful because even if the victim was able to delete the malware, they would still have to pay the ransom to receive a decryption key for their encrypted files. A spam campaign was identified to be the cause behind the CryptoLocker infections, which used a small file size and simple downloading function.

While CryptoLocker was taken down by a white-hat campaign, CryptoLocker got the foot in the door for variations of file-encryption ransomware, such as the widely-known imitators CryptoWall and TorrentLocker.

TeslaCrypt

TeslaCrypt originally targeted gamers of several specific and extremely popular games: Call of Duty, World of Warcraft, Minecraft, and World of Tanks. TeslaCrypt targeted the ancillary files associated with those video games that are commonly stored on the local hard drive.

In 2015-2016 TeslaCrypt was responsible for nearly half of all ransomware attacks. Surprisingly in 2016, the cybercriminals behind TeslaCrypt not only provided the master decryption key publicly, ending the threat, they even apologized.

SimpleLocker

In late 2015, the Android platform was targeted by SimpleLocker, the first Android-based attack to encrypt files. Additionally, it was the first ransomware to use a Trojan downloader mimicking a legitimate app to deliver the ransomware. The majority of victims were infected when they attempted to download porn or other shady apps from sources other than the Google Play store.

WannaCry

In mid-May of 2017, the WannaCry worm literally made ransomware life-threatening when it shut down hospitals in Ukraine and striking Britain’s National Health Service (NHS). Originally spread through malicious Dropbox URLs embedded in spam, WannaCry spread rapidly through a number of computer networks by infecting a Windows computer and encrypting files on the PC’s hard drive. Considered one of the worst ransomware attacks of all time, it was detected in more than 115 countries.

NotPetya

The Petya ransomware package originated in 2016 and was a standard package aimed at extracting Bitcoin from its victims. An updated version—named “NotPetya” to signify its advanced state from its predecessor—became prevalent while the world was still reeling from the WannaCry outbreak.

It is widely speculated that NotPetya was actually a state-sponsored Russian cyberattack on Ukraine, disguised as a ransomware attack.

Cerber

Cerber appeared in March 2016 and was notorious for its creepy voice component, which reads out the ransom message. It was responsible for an attack on millions of Microsoft Office 365 users who were potentially exposed.

GoldenEye

The GoldenEye ransomware attacks reported in Ukraine in late June of 2017, targeted Kiev’s largest airport, Ukraine’s national bank, and its state power company. Unlike most ransomware just encrypting files, GoldenEye attacked the entire computer preventing the system from booting up by encrypting the Master File Table. When the victim attempted to reboot their machine, a skull and crossbones splash screen appeared displaying the ransom demand.

Locky

Locky was especially notorious because it encrypted not just data files but also Volume Snapshot Service (VSS) files to stop victims from attempting to restore files using it. It also encrypted Bitcoin wallets. Its name comes from the fact that while encrypting the user’s files, it also renamed them to have the extension “.locky”.

Why Business Need to be Protected from Ransomware

Once cybercriminals realized that the real money was not in targeting individual home users, but in targeting companies, because of the major disruptions an attack would cause, the shift moved in that direction. In fact, nearly 70 percent of companies pay the ransom to recover their data.

Complex networks in businesses are often more vulnerable and many businesses are reluctant to report attacks because they fear it would damage their brand and cause customer losses.

Why Antivirus Programs don’s stop Ransomware Attacks

Antivirus software can’t detect ransomware because it is designed to stay hidden. While Antivirus programs can stop any known ransomware from attacking your business by reading the signature of the known ransomware, it can’t protect your business new ransomware attacks. Because stealth is critical to ransomware being a lucrative business, these cybercriminals are employing talented developers to ensure that their attacks remain undetected.

What to do if you get Attacked

Step 1: Disconnect from the network and stop backing data up immediately. Disconnect the infected machine from the network immediately after the infection is discovered.

Step 2: Remove ransomware and clean computers of malicious software. If you have a good restore, remove all traces of the ransomware using antivirus software or an appropriate malware remover before proceeding.

Step 3: Restore from the most recent clean backup. Provided  that  you  maintain  consistent  backups,  locate  a  clean  version  of  the  files,  and  restore  to  your  most  recent  backup  set.

How to stop Ransomware Attacks from Occuring

There are two key ways to combat ransomware and keep it from affecting your business.

The first is to have your staff educated on what to watch for and trained to be diligent since most ransomware attacks are launched via phishing emails. Train your associates to avoid opening unverified emails or clicking links embedded in unverified emails. Provide employees with examples of what phishing emails look like, so that the next time they receive an email from “FedEx” with a “tracking link” for a “package” they know nothing about, they will think twice before clicking the link and send it to the helpdesk.

Your associates should also adhere to such best practices such as keeping macros turned off in the Microsoft Office suite of software and avoiding the use of browser plug-ins including Adobe Flash, Adobe Reader, Java, and Silverlight except on an ad-hoc basis.

Secondly, evaluate your technical infrastructure and the way your IT pros build and maintain that infrastructure. With a solid, cloud-based business continuity plan, you can successfully avoid ransomware damage for your company.

Most security vendors are constantly working on updates to catch and stop ransomware before it infects your files. If you use antivirus or anti-malware services, be sure you are running the most recent versions of these products and do regular updates. And, setting up a next-generation firewall can combat numerous threats—in fact, some can even detect zero-day threats before they infiltrate the system.

If your business does become the victim of an attack, it can be a manageable event when your data is backed up and easily recoverable.

For more information on ransomware, download Evolve IP’s Ultimate Guide to Ransomware.

Clients We Work With

  • Association Resource Group is an award-winning technology consulting and brokerage firm with over 25 years as an industry-leader.

    We have been Evolve DaaS clients for just about 2 years. What execs really need to know is how much productivity DaaS brings to an organization. We have estimated that each employee saves 10 minutes a day in startup and shutdown time. Probably another 5 minutes a day in work from home productivity - i.e. more likely to log in from their home PC than if they had to carry a laptop home every night and no clunky VPN or Citrix session to dissuade them from getting on.

    So, 15 minutes a day, that is 3% of their day back. 3% of an $80,000 a year employee is $2,500.

    DaaS has a 300% return, with no capital at risk. That is what I would tell your execs. Feel free to ask questions.

    Best!

    Steve Murphey, Vice President

  • Based in Northern New England, ClearChoiceMD treats urgent, non-life-threatening medical needs.

    "With Cloud Connect, we have eliminated intermittent phone and internet service drops, increased the reliability of daily business tasks like writing e-prescriptions. We’ve even resolved printing issues. We have zero down time now as a result of connectivity because we’re always up and running.”

    Alex Fuchs, IT Director for CCMD

  • CCI Health & Wellness Services is a group practice, empowering patients to partner with staff for an unparalleled healthcare experience.

    “Usability is one of the most important factors in selecting technology solutions. We needed a solution that our staff could learn quickly and rely upon each day through high call volumes. Evolve IP emerged as best choice and the deployment has been very successful.”

    John Torontow, MD, MPH Chief Operating Officer - CCI Health and Wellness Services

Awards & Recognition

View More

Compliance & Certifications

View More

Latest Blog Posts

Evolve IP Cloud Scholarship
Evolve IP Cloud Scholarship
November 30, 2017 / Evolve IP
Evolve IP’s annual Cloud Scholarship is designed to help students who are studying for a career in technology or computer…
Tape vs. disk vs. cloud: A comparison of data backup options
Tape vs Disk vs Cloud: A comparison of Data Backup Options
November 20, 2017 / Evolve IP
Business continuity plans are a must in today’s environment, where even a few hours of downtime could be very costly…
Selecting a Cloud Computing Services Partner: Considerations for Cloud Success
Selecting a Cloud Computing Services Partner: Considerations for Cloud Success | Part 2
November 14, 2017 / Dave McCrystal
As explained in Part 1 of this 2-part blog, cloud-based services implementations work best when companies view the cloud as a…
View More

Latest Press Releases

Credit Union 1 Improves Member Experience and Increases ROI with The Evolve IP OneCloud®
December 13, 2017 / Evolve IP
Long-Term Partnership Compounds IT Investment with Decreased Costs, Improved Member Services and Greater Efficiencies for Multi-Branch Financial Institution WAYNE, Pa.—December 13, 2017 - Evolve IP, The Cloud Strategy Company®, today…
Evolve IP Honored with 2017 Cloud Computing Security Excellence Award
November 7, 2017 / Evolve IP
WAYNE, Pa.—November 7, 2017—Evolve IP, The Cloud Strategy Company™, announced today that TMC, a global, integrated media company, has named The Evolve IP Compliance Cloud™ as a 2017 Cloud Computing Security Excellence…
Evolve IP Named in Gartner’s 2017 Magic Quadrant for Contact Center as a Service, North America
October 30, 2017 / Evolve IP
WAYNE, Pa. — October 30, 2017 — Evolve IP, The Cloud Strategy Company™, today announced that Gartner has named it to the 2017 Magic Quadrant for Contact Center as a…
View More
close

Contact Us

or Call 1.877.459.4347