Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

4/21/2016
10:00 AM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

A Brief History Of Ransomware

A top ten chronicle of more than a decade of notable ransomware variants and trends.
Previous
1 of 11
Next

The rise in ransomware extortion as a reliable weapon for cybercriminals to make the most of victims' system vulnerabilities has now spanned the better part of a decade. But the last year has seen hockey stick growth as attackers perfected their methods and targeted victims. At this point ransomware has established itself as $60 million a year criminal enterprise, with that number sure to rise as the income is funneled into improving the next ransomware generation.

"Businesses often believe that paying the ransom is the most cost effective way of getting their data back - and this may also be the reality," writes William Largent, threat researcher with Cisco Talos. "The problem we face is that every single business that pays to recover their files, is directly funding the development of the next generation of ransomware. As a result of this we're seeing ransomware evolve at an alarming rate."

In order to understand where ransomware is going, it is important to understand its roots. In this slide show, we take a look at some of the notable variants that have cropped up over the years. Special thanks to Largent and researchers at Cisco Talos who accumulated and condensed much of the info included here. You can check out their take on Ransomware: Past, Present and Future here

 

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Previous
1 of 11
Next
Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
4/24/2016 | 11:08:33 AM
Link to spam
It is interesting to compare the rise of ransomware with the downfall (at least, from its heyday) of pharma spam.  As botnet masters and other black-hatters lost one of their primary sources of income, they had to start using their machines and know-how in other ways to make money.
MKultra
50%
50%
MKultra,
User Rank: Apprentice
4/24/2016 | 4:00:46 PM
ransomware - new tread or nonsense ?!!
hi fans,

well - i had never trouble with this special type of malware insofar, although i get lots of emails every day,

about 250 - 400, mostly newletters from newspapers all over the world !!!

i am very careful NOT clicking attachment links in emails, so the chance to get ransomware is very low.

i have lots of security software on my notebook - eg. antivius (avast free edition), good firewall (comodo), anti-

spyware (spyhunter and spybot search + destroy), anti-rootkit (avg) and many others, at last an intrusion                                                                                                                                                                                                                                                                                          

detection system (sax 2), if an excellent blackhat enters my computer ...

 

 

thats all for now - hope to hear from you

sincerly

diplom-engineer matthias klein (ANONYMOUS-hacker and universal genius !!!)
Nanireko
50%
50%
Nanireko,
User Rank: Apprentice
12/26/2016 | 1:57:37 PM
Ransomware Chronicle
It's just the begining 
Navigating Security in the Cloud
Diya Jolly, Chief Product Officer, Okta,  12/4/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-16772
PUBLISHED: 2019-12-07
The serialize-to-js NPM package before version 3.0.1 is vulnerable to Cross-site Scripting (XSS). It does not properly mitigate against unsafe characters in serialized regular expressions. This vulnerability is not affected on Node.js environment since Node.js's implementation of RegExp.prototype.to...
CVE-2019-9464
PUBLISHED: 2019-12-06
In various functions of RecentLocationApps.java, DevicePolicyManagerService.java, and RecognitionService.java, there is an incorrect warning indicating an app accessed the user's location. This could dissolve the trust in the platform's permission system, with no additional execution privileges need...
CVE-2019-2220
PUBLISHED: 2019-12-06
In checkOperation of AppOpsService.java, there is a possible bypass of user interaction requirements due to mishandling application suspend. This could lead to local information disclosure no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVers...
CVE-2019-2221
PUBLISHED: 2019-12-06
In hasActivityInVisibleTask of WindowProcessController.java there?s a possible bypass of user interaction requirements due to incorrect handling of top activities in INITIALIZING state. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction ...
CVE-2019-2222
PUBLISHED: 2019-12-06
n ihevcd_parse_slice_data of ihevcd_parse_slice.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android...