To win the fight against a rapidly evolving malware, it has become the responsibility of every device user to protect themselves before ransomware strikes. But where does it come from? How does it spread? And where can it possibly go?
A PROFITABLE ORGANIZED CRIME
Despite its brief spurt of fame, the effects of WannaCry ransomware had certainly left its mark. According to McAfee Labs’s estimates from mid-May 2017, the ransomware struck over 10,000 organizations, and 200,000 individuals across 150 countries, collecting at least US$145,168.96 in just 20 days. It’s not like any organized crime we’ve known, since cartels and black markets take decades to consolidate its influence and profits. In fact, ransomware has a relatively short history compared to regular malware, such as viruses, trojans, and adware.
The earliest instances of ransomware were first spotted in Russia as early as 2005. Their encryption methods were primitive, in comparison to modern strains like CryptoLocker and WannaCry. A 2006 ransomware called TROJ_CRYZIP.A zipped particular file types (.doc, .xls, .jpg, etc.) with password protection, and demanded US$300 in ransom via a simple .txt file.
It was only after 2012 when ransomware started actively targeting other territories, such as Europe and North America. One of the more memorable examples was Reveton, which uses location tracking to display a fake enforcement agency notification that’s relevant to the victims. For example, a US-based user would get a fake FBI notification about their alleged “illegal activities” online. Folks in France would see the same message in French, while it spoofed the Gendarmerie Nationale emblem instead. According to cybersecurity blog Malwarebytes Lab, this variant still persisted in March 2016, and further improvements allow it to target Mac OS X users. It also included a wider panel of impersonated authorities, such as the Royal Canadian Mounted Police and Europol.
Denne historien er fra July 2017-utgaven av HWM Singapore.
Start din 7-dagers gratis prøveperiode på Magzter GOLD for å få tilgang til tusenvis av utvalgte premiumhistorier og 9000+ magasiner og aviser.
Allerede abonnent ? Logg på
Denne historien er fra July 2017-utgaven av HWM Singapore.
Start din 7-dagers gratis prøveperiode på Magzter GOLD for å få tilgang til tusenvis av utvalgte premiumhistorier og 9000+ magasiner og aviser.
Allerede abonnent? Logg på
Should I Buy Cyberinsurance?
Personal cyberinsurance covers a range of cybercrimes such as cyber extortion, cyberbullying, online fraud, and data loss.
Quick Tips: Five Things To Do If You Get Hacked
It might seem like an obvious choice at first, but many people often resort to panic-clicking device options, rebooting, Googling for solutions, calling tech support (or that tech-savvy friend) for help, all while leaving the compromised device connected.
CLASH OF THE EXECUTIVE SALOONS: BMW 5201 VS MERCEDES-BENZ E200
The BMW 5 series and Mercedes-Benz E-Class are motoring institutions.
SENNHEISER TULLAMORE FACTORY TOUR: HOW THE WORLD'S BEST HEADPHONES ARE MADE IN IRELAND
It’s a relatively common practice for brands to have separate facilities for parts manufacturing and product assembly, whether it’s for cost or other reasons.
Tech Awards 2024 Readers' Choice
BEST OF PERSONAL COMPUTING
Good For Nothing
After a rocky start with the Nothing Phone (1), the company turned things around by releasing the incredible Nothing Phone (2).
A For Affordable AI
The Google Pixel 8a has arrived, offering many features from its flagship siblings at a more affordable price. It maintains a sleek, compact design, making it easy to handle with one hand.
Mercedes Benz EQS SUV
Mercedes-Benz's adoption of electricity has been impressively rapid.
5 Steps To Secure Your Home With A Mesh Network
Firewalls filter data in network traffic to protect the network from a wide variety of malicious attacks and malware.
The Best Hair Straightener
When I first saw the Dyson Airstrait straightener, my immediate feelings were one of cautious optimism.