Log in
Enquire now
Ransomware

Ransomware

Ransomware is a type of malware from cryptovirology that threatens to publish personal data or perpetually block access to information or data, often until a ransom is paid.

OverviewStructured DataIssuesContributors

Contents

Other attributes

Wikidata ID
Q926331
Overview

Ransomware is malware that uses encryption to hold a victim's information at ransom. This type of attack attempts to encrypt a victim's critical data so the victim cannot access files, databases, or applications. The ransom is then demanded in order to resume access. These attacks are not necessarily sophisticated for the attacker to pursue, often requiring minimal skills due in part to the advent of "ransomware as a service," which has seen ransomware developers lease pre-made malware similar to other software products. Often these developers receive a portion of the ransom payments.

In some of these attacks, the attacker might claim to be a law enforcement agency and shut down a victim's computer due to the presence of some software on it and demand a "fine," in part to make victim's less likely to report the attack. Whereas, other types of attacks will choose larger organizations either by opportunity, because the organization might have smaller security teams but do a lot of file sharing, or the organizations may be targeted because they are more likely to pay a ransom faster, such as government agencies or medical facilities that require immediate access to their files.

Types of ransomware

There are largely three types of ransomware: scareware, screen lockers, and encrypting ransomware.

Scareware

Scareware often includes security software and tech support scams, including pop-up messages claiming that malware was discovered and the only way to remove it is to pay. If the victim does not pay, they are likely to be bombarded with pop-ups, while the files on the computer are often safe.

Screen lockers

Lock-screen ransomware, as it sounds, locks the user out of their computer until a ransom is paid. Often, in these cases, upon startup of a computer a full-size window will appear, often accompanied by an official-looking seal suggesting that illegal activity has been detected on said computer and a "fine" must be paid. Other times these windows will be more direct.

Encrypting ransomware

This is the type of ransomware that is most concerning, as this is the type that collects a user's or organization's files and encrypts them before demanding a payment, in order to decrypt and redeliver. Part of the danger of this type of ransomware is that once the files have been compromised, no security software or system can restore or return them. And while often the payment of a ransom the files will be returned, there is no guarantee that they will be, and there is no guarantee the files will not be copied and used for further ransoms.

Ransomware examples

While there are thousands of varieties, some of the more common attacks in circulation include:

Ransomware examples

Ransomware
Description

Bad Rabbit

Considered a cousin of NotPetya and using similar code and exploits to spread, Bad Rabbit appeared to target Russia and Ukraine, impacting many media companies. Bad Rabbit, unlike NotPetya, allowed for decryption if the ransom was paid. The majority of cases indicate that it was spread through a fake Flash player update.

CryptoLocker

This was one of the first current generation ransomware that required cryptocurrency for payment and encrypted a user's hard drive and attached network drives. The ransomware was spread through emails with attachments that claimed to be FedEx and UPS tracking notifications. A decryption tool was released in 2014, but some reports claim that CryptoLocker has extorted upwards of $27 million.

DearCry

DearCry is a ransomware that encrypts certain types of files, that is designed to take advantage of four vulnerabilities disclosed in Microsoft Exchange, which were made known around March 2021. Once the encryption is finished, DearCry shows a ransom message instructing users to send an email to ransomware operators to decrypt files.

DoppelPaymer

This ransomware is known to target enterprises by gaining access to administrative credentials and using them to propagate the infection across an entire Windows network. In reported cases, criminals have been known to contact victims and demand further payment.

Lockbit

Lockbit is a data encryption malware in operation that was noticed in September 2019 and has since been found to be a ransomware-as-a-service. This piece of ransomware was developed to encrypt large organizations rapidly to prevent detection by security appliances and IT/SOC teams.

Protecting against ransomware

Individuals and organizations are discouraged from paying the ransom as the files are not guaranteed to be released. The FBI has previously advised that if Cryptolocker, Cryptowall, or other sophisticated forms of ransomware are involved, the victim is unlikely to get their data back without paying a ransom. The individuals and organizations can work to prevent ransomware attacks, with the recommended measures to protect computers and networks from ransomware infections including:

  • Employ a data backup and recovery plan for all critical information. This includes regular backups to limit the impact of data or system loss to expedite the recovery process. Critical backups also should be isolated from a network for the best protection
  • Keep operating systems and software up-to-date with the latest patches. Vulnerable applications and operating systems are the targets of most attacks, and ensuring these are patched to reduce the number of exploitable entry points
  • Maintain up-to-date anti-virus software and scan all software downloaded prior to executing
  • Restrict users' ability (permissions) to install and run unwanted software applications, and apply the principles of "least privilege" to all systems and services. This can limit the extent to which malware can spread through a network
  • Avoid enabling macros from email attachments
  • Do not follow unsolicited web links in emails, or phishing schemes
Ransomware removal

In the case of an individual computer that has been infected by ransomware, there are a few things an individual can do to regain control of the computer. However, as noted above, in the case where an organizations network has been compromised or its files have been encrypted, the process becomes more difficult and expensive. The important steps for an individual include:

  • Rebooting the computer to safe mode
  • Installing anti-malware software
  • Scan the system to find the ransomware program
  • Restore the computer to a previous state

These steps can remove malware from a computer and return it to an individuals control, but it cannot decrypt files. Depending on the sophistication of the malware, it can be mathematically impossible to decrypt the files without access to the key held by the attackers.

History of ransomware

The primitive pioneer of ransomware was used as early as 1989, in which attackers would blackmail computers. This period saw the "AIDS virus," which was used to extort funds from recipients of the ransomware. The payments were made by mail to Panama, and a decryption key was mailed back to the user.

In 1996, ransomware was more commonly known as "cryptoviral extortion," which was introduced by Moti Yung and Adam Young from Columbia University. The idea illustrated the progression and creation of modern cryptographic tools, with the first attack presented by Young and Yung at the 1996 IEEE Security and Privacy conference. This virus contained the attacker's public key and encrypted the victim's files, before prompting the victim to send asymmetric ciphertext to the attacker to decipher and return the decryption key, for a fee.

In order to remain anonymous, and undetected, attackers have often required payments that are intended to be difficult, if not impossible, to trace. For example, ransomware Fusob required victims to pay using Apple iTunes gift cards instead of normal currencies. The popularity of ransomware attacks has grown with the growth of cryptocurrency, as the transactions of cryptocurrencies are often anonymous and near impossible to track.

However, the first real cases of ransomware were reported in Russia in 2005. Ransomware has since spread globally and continues to prove successful. There was a dramatic increase in ransomware attacks around 2011, and since then antivirus software companies have increasingly focused scanners on ransomware.

Regional differences have also emerged in ransomware attacks. For example, in some regions, incorrect messages about unlicensed applications will be used, notifying the victim that an unlicensed software is installed and prompting the user to make a payment to license the given software. In other regions, the attacks will take the form of false claims about illegal content. However, this latter approach does not work as well in countries where illegal software downloads are common practice. These attacks will claim that they are from law enforcement agencies and that some illegal content has been found on the victim's computer. This message also contains demand for a penalty to be paid.

One of the largest ransomware attacks took place in 2017 and was called WannaCry. The attack affected around 200,000 individuals in roughly 150 countries and were asked to pay their ransoms in Bitcoin.

Olympus ransomware attack

In September 8, 2021, Olympus was expected to be recovering from a ransomware attack that began in the early morning. The company stated later that it was investigating a potential cybersecurity incident that affected its European, Middle East, and Africa networks. The company's response included suspending data transfers in affected systems and informing relevant external partners while deploying a response team which included forensic security experts.

A ransom note left behind on infected computers claimed to be from the BlackMatter ransomware group. The note included a web address to a site accessible only through the Tor Browser that's known to be used by BlackMatter to communicate with victims. BlackMatter is a ransomware-as-a-service group that was founded as a successor to ransomware groups, including DarkSide. The group is known to rent access to their infrastructure to allow affiliates to launch attacks, and the group typically steals data from a company's network before encrypting it and often threatening to publish the files online if the ransom is not paid.

Timeline

No Timeline data yet.

Further Resources

Title
Author
Link
Type
Date

Frequently Asked Questions - Ransomware | Information Security Office

https://security.berkeley.edu/faq/ransomware/

Web

Opinion: Ransomware attacks are about to get worse. But there are ways to stop them

Opinion by Matthew F. Ferraro for CNN Business Perspectives

https://www.cnn.com/2021/09/13/perspectives/ransomware-attacks-cybersecurity/index.html

Web

September 13, 2021

Ransomware - definition, prevention and removal

https://www.kaspersky.com/resource-center/threats/ransomware

Web

July 5, 2021

Ransomware - What is it & how to remove it? | Malwarebytes

https://www.malwarebytes.com/ransomware

Web

Ransomware Attack - What is it and How Does it Work?

Check Point Software

https://www.checkpoint.com/cyber-hub/threat-prevention/ransomware/

Web

October 2, 2019

References

Find more entities like Ransomware

Use the Golden Query Tool to find similar entities by any field in the Knowledge Graph, including industry, location, and more.
Open Query Tool
Access by API
Golden Query Tool
Golden logo

Company

  • Home
  • Press & Media
  • Blog
  • Careers
  • WE'RE HIRING

Products

  • Knowledge Graph
  • Query Tool
  • Data Requests
  • Knowledge Storage
  • API
  • Pricing
  • Enterprise
  • ChatGPT Plugin

Legal

  • Terms of Service
  • Enterprise Terms of Service
  • Privacy Policy

Help

  • Help center
  • API Documentation
  • Contact Us
By using this site, you agree to our Terms of Service.