Skip to main content

Ransomware is the new hot threat everyone is talking about; what do you need to know?

what is ransomware and should you be worried about it shutterstock 223094779
Image Credit: Shutterstock/Wk1003mike
You wake up one day, rub the sleep out of your eyes, and boot up your laptop. Expecting to see a Twitter feed or Facebook profile, instead you’re greeted with a big red image, demanding that if you don’t pay $200 to an unknown party in the next 24-hours, everything you know and love on your computer will be erased, and gone forever.

Welcome to the world of “ransomware,” the newest, hottest way that underground criminals are pulling cash from the pockets of innocent victims and using it to fund their clandestine operations. But what exactly is this ransomware stuff, and is there anything you can do to protect yourself against it?

A brief history of ransomeware

As antivirus vendors and security professionals continue to make headway against global malware campaigns on a daily basis, hackers have been looking for more inventive ways of keeping their revenue streams strong without relying on standard credit card fraud techniques.

The result of this effort has come in the form of new viruses like Cryptolocker, Cryptowall, and more recently, TeslaCrypt, which are all members of an increasingly popular family of infections known as “ransomware.” The earliest known version of ransomware, called CryptoLocker, first debuted on the scene around the tail end of 2013, and hit so hard the Internet barely had enough time to figure out what it was dealing with in the first place.

In what seemed like no more than a week, a flood of users were reporting that a new, unknown style of virus had locked down their hard drives, and was demanding a healthy ransom to return control of their most prized files and folders. By capitalizing on the relatively unknown nature of its infection style, ransomware was able to sweep through tens of thousands of computers in a matter of days, spreading through established botnets and infecting users via standard phishing links embedded in email attachments and untrustworthy downloads.

Locker17

Despite trying system resets, flashing the BIOS, or installing new hard drives altogether, the only screen they would be able to see was the hacker’s flyer which told them how much they needed to pay to regain access, and how long they had left before the format bomb would eventually go off.

Worse, users started reporting that the hackers were making good on their word, and would remove CryptoLocker if the terms had been met in the allotted 24-hour period. This only encouraged more desperate and confused victims to pay the fee instead of looking for an alternative option, which in turn, fueled the spread among criminal organizations who spied a new, quick way to make an easy buck.

Unlike classical malware that installs keyloggers, backdoors, or trojans on a computer in the hopes that a user would eventually type in the details of a credit card or other personal information that could later be used or sold, CryptoLocker and its many subsequent variants offered a simple, and reliable revenue stream that the underground market could capitalize on to fund other, less-profitable operations.

Amounts demanded for the ransom would vary wildly depending on the criminal ring behind it, anywhere from $25 to $600, almost always paid either in Bitcoin, or sent through MoneyGram onto untraceable prepaid cards in Eastern European nations.

The threat goes mobile

Not soon after PCs were experiencing a torrent of total lockdowns, both mobile security firms and mobile phone owners were reporting that the threat had migrated onto select pieces of hardware running Google’s Android operating system, and even a few devices in the iOS ecosystem we subjected to similar attacks.

Mobile ransomware would work much the same as its bigger cousin, locking down a device entirely, with only a message being displayed that demanded an exorbitant sum be paid within a certain amount of time or the phone would be wiped clean.

Luckily, many of the victims of mobile attacks were relatively safe from harm, as most phones and tablets with Android or iOS automatically back up vital internal data like photos, contacts, notes or texts to cloud services every time the device is plugged in for a charge. Sure, they might have lost a couple songs stored on their SD cards, but other than that, the damage caused by mobile ransomware is significantly less pronounced than what we’ve seen on full-fledged PCs.

The solution…sort of

In this respect, there are two simple solutions to making sure you don’t become a target for ransomware, though it should be noted that one carries considerably more risk than the next.

The first is to simply wait to see if you get infected, and if so, hope that one of the major antivirus vendors have created a fix for your specific type of ransomware. What was once an un-defeatable beast of terrifying magnitude has since been wrangled into a much more manageable threat, and many of the top AV companies have provided fixes that you can download and fit on a USB stick to plug in when the ransom screen appears. With enough time to study the patterns and attack paths of ransomware, malware research groups have found several key tactics to penetrate its armor, which thankfully don’t trigger the self-destruct mechanism in the process.

That said, new types of ransomware (much like the malware it’s based off of), are being developed daily, and it’s nearly impossible for AV companies to account for every different style as they emerges in real time. If you happen to get caught in the web of a new ransomware, your chances of getting your data back unharmed are unfortunately slim to none, unless you give in to the hacker’s demands.

The second method of prevention is much more secure, and in our opinion, the only way to go when it comes to malware.

Back. Up. Everything.

At its core, ransomware exploits people’s unwillingness to back up their most precious data and files onto a separate hard drive that is completely disconnected from their main PC or network. By not creating separate carbon copies of their photo albums, music, programs, or documents, this type of malware can hold these folders hostage, and expect you to pay because it’s the only version you have in existence.

By backing up your operating system and all its contents to an air-gapped external hard drive every single day, you completely mitigate the risk of ransomware by circumventing the tool it uses to get you to pay up in the first place.

Imagine if a real live hacker came into your house at night, stole your computer, and then called you in the morning with demands to “pay up, or the PC gets it.” Little do they know, you had another identical computer waiting for just such an emergency in your closet. You could tell them to keep what they took, and just pull out the new tower and go about enjoying the rest of your day.

That’s the level of security from ransomware you can have as long as you remember to backup all of your data once a day, every day, and be sure to disconnect the drive when you’re done.

Alternatively, you can use a cloud storage solution or backup service to provide the same level of protection. This too will prevent you from becoming a victim of ransomware, and it’s often easier than backing up to a hard drive every day or week. On the downside, such services are much more expensive over time than a hard drive, so you pay for their convenience.

Conclusion

When ransomware first hit, it sent a shockwave through the security industry and claimed tens of thousands of computers as a result.

Since then, we’ve adapted. We’ve studied the tactics of the hackers, and maneuvered through their nonsense to create a system of users and protectors that are ready for whatever the underworld might have to throw our way.

Ransomware is still a problem, sure. Yes, it still claims tens of thousands of PCs, laptops, and mobile devices per year, but it’s not anywhere near the threat that it used to be, and its overall impact grows smaller by the day.

As long as you’re prepared, you can stay one step ahead of ransomware, and simply shake it off like a bad cold if it ever shows up on your doorstep uninvited.

Editors' Recommendations

Chris Stobing
Former Digital Trends Contributor
Self-proclaimed geek and nerd extraordinaire, Chris Stobing is a writer and blogger from the heart of Silicon Valley. Raised…
Trying to buy a GPU in 2023 almost makes me miss the shortage
Two AMD Radeon RX 7000 graphics cards on a pink surface.

The days of the GPU shortage are long over, but somehow, buying a GPU is harder than ever -- and that sentiment has very little to do with stock levels. It's just that there are no obvious candidates when shopping anymore.

In a generation where no single GPU stands out as the single best graphics card, it's hard to jump on board with the latest from AMD and Nvidia. I don't want to see another GPU shortage, but the state of the graphics card market is far from where it should be.
This generation is all over the place

Read more
HP printers are heavily discounted in Best Buy’s flash sale
The HP - OfficeJet Pro 8034e Wireless All-In-One Inkjet Printer on a desk with a smartphone.

There’s good news in store if you’re looking to land a new printer at a discount this weekend. Best Buy is having a 48-hour flash sale on HP printers, with several that can compete with the best printers seeing some good prices. HP is almost always one of the best laptop brands, and it’s one of the same when it comes to printers. So if you’re looking for a new home or office printer, read onward on how to save on an HP printer at Best Buy.
HP DeskJet 2755e — $60, was $85

The HP DeskJet 2755e is a good entry-level printer. It’s got you covered if your printing needs are pretty basic, or if you don’t need to print in mass. This is a color InkJet printer, which makes it good for almost all uses. It can also make copies and scan in color, and it has mobile and wireless printing functionality. You can get set up quickly and easily with the HP Smart app that guides you through the setup process, and you can also use this app to print, scan and copy documents from your phone.

Read more
This tiny ThinkPad can’t quite keep up with the MacBook Air M2
Lenovo ThinkPad X1 Nano Gen 3 rear view showing lid and logo.

While the laptop industry continues to move toward 14-inch laptops and larger, the 13-inch laptop remains an important category. One of the best is the Apple MacBook Air M2, with an extremely thin and well-built chassis, great performance, and incredibly long battery life.

Lenovo has recently introduced the third generation of its ThinkPad X1 Nano, one of the lightest laptops we've tested and a good performer as well. It's stiff competition, but which of these two diminutive laptops stands apart?
Specs and configurations

Read more