Ransomware as an engine of progress

Have you ever encountered such a virus, when a window pops up on the entire screen asking you to transfer a certain amount to such a PayPal wallet?

It is usually difficult to close and annoyingly covers most of the screen. Such a window is generally considered to be an ordinary virus, and perhaps this is correct, because most of such programs can still be removed without reinstalling the system.

Such programs became widespread in the 2000s. Society quickly found ways to combat them, so the only thing left for such viruses was to adapt to the rapid progress in the field of cybersecurity.

AT THE TURN OF TIME

The beginning of the second decade brought full-fledged WEB 2.0 to our world — a new era of the Internet, which gave the whole world the opportunity to store terabytes of information on cloud storage. Humanity has forgotten what disks and flash drives are, transferring all information for storage to the Internet.

Then, WEB 3.0 came to replace it, which proved that any information is property and each user should own what he himself created. And it was at this junction of WEB 2.0 and WEB 3.0 that viruses such as Ransomware appeared.

Ransomware is aimed at attacking cloud storage or hard drives, since many users store information there. Ransomware, is malware that locks a system until the victim pays funds (increasingly in the form of cryptocurrency) for removal. In simple words — a program that blackmails the victim.

HE VOLUME OF STOLEN FUNDS USING RANSOMWARE FOR THE PERIOD 2017−2022

According to a report by the American analytical company specializing in blockchain technologies Chainalysisransomware accounted for about $ 457 million in 2022, which is approximately 9% of the total amount of stolen funds. With the help of Ransomware, hackers received $ 456.8 million, which is 40% less than $ 765.6 million in 2021.

The boom of 2020−2021 is connected, first of all, with the situation in the world. The coronavirus epidemic and universal remote work have provided ransomware with a huge amount of work.

The most common way cybercriminals infect data files is by sending emails with malicious links or attachments. Employees clicking on these links inadvertently initiate an attack. These emails can be mass emails sent to millions of potential victims, or they can be targeted messages to people in specific organizations. In the latter case, they are usually combined with social engineering methods, with the help of which cybercriminals collect the necessary information about the victim in advance.

EXAMPLES OF RANSOMWARE

Locky is a ransomware attack that was first carried out by a group of organized hackers in 2016.

Over 160 file types have been encrypted using Locky. The program was distributed via emails containing infected attachments.

Users fell for the email scam and installed ransomware on their computers. This distribution method is called phishing and is a form of social engineering. Locky ransomware targets file types commonly used by designers, developers, engineers, and testers.

The WannaCry attack was a ransomware attack that occurred in over 150 countries in 2017.

It exploited a Windows security vulnerability created by the NSA and made public by the hacker group Shadow Brokers.

The attack affected 230,000 computers worldwide, including a third of NHS hospitals, causing £92 million in damage. Users were blocked and required to pay a ransom in Bitcoin. The attack exposed a problem with legacy systems as hackers exploited a vulnerability in the operating system. The global financial cost of WannaCry is estimated at approximately $ 4 billion.

Ryuk is a ransomware Trojan that spread in August 2018.

It does not allow you to restore the Windows function, making it impossible to restore encrypted data without a backup. The Ryuk virus also encrypts network hard drives.

The attack had widespread consequences and many US companies that were affected paid the required ransom amount. Total damage is estimated at more than $ 640,000.

Ransomware is used in a wide variety of areas. Typically the ransom amount ranges from $ 100 to $ 200. However, sometimes, attackers demand much more if they realize that blocking data can cause significant financial losses for the company. This allows cybercriminals to earn significant amounts of money.

STINGY PAYS TWICE: OR “FROM ORDINARY USERS TO CORPORATIONS”

Hackers are evolving, gradually moving from ordinary users to companies. The chances that the company, in order to preserve its image, status and data, will pay the ransom are much higher.

Symantec study showed that 81% of the total number of infections occurred in corporate infrastructure, and when looking at market segments, then 62% of attacks occur on small and medium-sized businesses.

Let us present statistics from the Coveware company, according to which it can be noted that the percentage of those who agreed to pay the ransom is decreasing. Because of this, hackers have no choice but to take big fish for profit.

HOW TO AVOID GETTING HOOKED BY HACKERS

As they say, to sum it up, we would like to give Internet users a few rules that should always be kept in mind, each point comes down to making each user more aware of the problem. And remember: informed means armed!

If you have reached the end, then you really understand the importance of cybersecurity. That’s why we give you 5 free cryptocurrency address AML checks for connection with dirty funds and fraudulent activities in our service: https://btrace.amlcrypto.io/Contact us in any convenient way and mention the promo code “mrxyz5”.

Subscribe to AML Crypto
Receive the latest updates directly to your inbox.
Mint this entry as an NFT to add it to your collection.
Verification
This entry has been permanently stored onchain and signed by its creator.