Imagine it’s an otherwise typical day. You wake up, head into the office, pour yourself a cup of coffee, and settle in to get some critical work done before its due. Something is different this time. Instead of your computer booting up smoothly and showing your desktop, you’re greeted with a scary-looking window featuring an image of a large padlock. Text in that window tells you that your data has been locked down, and will be permanently inaccessible after a few days unless a ransom is paid. The amount and method of payment may vary, but the threat does not: Pay up or never see your data again.
So what is ransomware? Simply put, it’s malicious software that locks down data unless a ransom is paid, hence the name. It’s relatively new as far as malicious software goes; the first known version hit the scene in late 2013. But it’s far from benign, as thousands of computers have fallen victim to it since that infamous debut.
Ransomware likely came about as a result of both improved education of computer users and the work of both computer security professionals and antivirus companies. Just a few years ago, it was common for users to infect their computers by clicking malicious links they received in an e-mail message. At the same time, the various antivirus companies seemed to be locked in a constant game of catch-up with virus creators as more and more malicious programs were released. Nowadays, not only are people more savvy about what they click and what they download, the antivirus companies have made significant headway against global hackers and malicious software creators. This has led to those groups seeking more novel means by which to maintain their revenue streams without turning to old techniques such as credit card fraud.
Like most types of malware, ransomware generally infects computers through clicking an unsafe link or downloading unsafe programs. These can come in e-mails, torrents, botnets, or other forms of transmission. Unlike other types of malware, ransomware isn’t removed when the computer’s owner flashes the BIOS, wipes the drive, or attempts to return to a prior restore point. The program locks down user files and the ransom demand is made, while a unique decryption key is created and stored on the hacker’s servers. If the ransom is not paid in time, or if any attempt to alter the program directly is made, the decryption key is permanently deleted, rendering all encrypted files inaccessible. If the ransom is paid in time, the decryption key is transferred and the files will be decrypted. The ransom is usually demanded either in a currency like BitCoin or sent through a service like MoneyGram and loaded onto untraceable prepaid credit cards. Because the ransom leads to the files being released in most cases, this has led to desperate people simply paying the ransom instead of looking into alternative options. This emboldens the hackers, encouraging them to find more and more unscrupulous ways to make money.
Ransomware is more than merely a nuisance. While the infected computer can still be used, the risk of losing valuable data can impact productivity. With that in mind, there are ways to counteract or avoid a ransomware attack. The best defense is to remain vigilant. Like any malicious software, ransomware relies on social engineering to get users to click links and download the program. If users can avoid clicking the link that promises to lead to an outrageous video, or download the ‘free system scan’ program in the ad on a random website, they can avoid inadvertently allowing ransomware and other malware onto their computers. Also, keeping antivirus and firewall software up to date will help keep a computer from being remotely taken over and used as part of a botnet.
The other defense is to maintain consistent computer back-ups. Since ransomware encrypts data on the computer, hackers count on those files being the only ones of their kind in existence. If there is a current data backup, then that takes a large advantage away from the hackers. After all, why would someone pay a ransom to have their files decrypted if they have a recent backup of those same files that they can copy back onto a computer? Computer users should not only maintain a daily backup of their files, but they should also remember to disconnect the backup hard drive after each use. If it’s not feasible to keep a physical hard drive around for backups, cloud storage can also be utilized in order to keep files safe and secure.
If the worst does happen and a computer is infected by ransomware, the important thing is not to panic. Many antivirus companies now have fixes available to combat the most common types of ransomware. The fix can be downloaded from the company website and put on a USB flash drive, which can be plugged in when the ransom screen appears. Unfortunately, new types of ransomware are constantly being developed and released, so the ransom may have to be paid if the computer is infected with one of the newer programs.
When it first came onto the scene in 2013, ransomware caused a significant amount of panic due to its novelty and method of attack. Since then, experts have made significant strides in combating this type of malicious software. Small business owners can be especially vulnerable to ransomware attacks, as they may lack the funds to institute strong security measures. However, as long as data is kept safe and protected and users remain vigilant, ransomware can be defeated before it gains a foothold in a computer.
The cost of cybercrime is predicted to hit $10.5 trillion by 2025, according to the latest version of the Cisco/Cybersecurity Ventures “2022 Cybersecurity Almanac.”.
It takes an average of 287 days for security teams to identify and contain a data breach, according to the “Cost of a Data Breach 2021” report released by IBM and Ponemon Institute.
The internal team was energized. With the Level 1 work off its plate, the team turned its attention to the work that fueled company growth and gave them job satisfaction.
The average cost of a data breach in the United States is $8.64 million, which is the highest in the world, while the most expensive sector for data breach costs is the healthcare industry, with an average of $7.13 million (IBM).
40% of businesses will incorporate the anywhere operations model to accommodate the physical and digital experiences of both customers and employees (Techvera).
More than 33 billion records will be stolen by cybercriminals by 2023, an increase of 175% from 2018.
Forty-three percent of attacks are aimed at SMBs, but only 14% are prepared to defend themselves (Accenture).
The three sectors with the biggest spending on cybersecurity are banking, manufacturing, and the central/federal government, accounting for 30% of overall spending (IDC).
We did a proof of concept that met every requirement that our customer might have. In fact, we saw a substantial improvement.
We did everything that we needed to do, financially speaking. We got our invoices out to customers, we deposited checks, all the things we needed to do to keep our business running, and our customers had no idea about the tragedy. It didn’t impact them at all.
“We believe our success is due to the strength of our team, the breadth of our services, our flexibility in responding to clients, and our focus on strategic support.”