back to article The evolution of ransomware: How a nuisance turned into a business menace

To many Internet users it must look as if ransomware arrived out of the blue. Pioneers such as Cryzip started circulating at very low levels in the UK as early as 2006 and yet it wasn’t until 2013 that this type of malware suddenly spiked with the appearance of its first big global superstar, CryptoLocker. CryptoLocker, and …

COMMENTS

This topic is closed for new posts.
  1. Anonymous Coward
    Anonymous Coward

    InterceptX

    I have a program that does the same as InterceptX... I was going to release it as open source.. but did not when I realized it is pointless against well designed ransomware.. it only works for data corruption.

    The reason for this, is you can create a driver for the filesystems.. and all appears to be "ok", with no file access and modifications.. but in the back the files are being encrypted.. only the driver shows the data, as it has the key, and all is ok.

    Then, at some point, the key is erased and the ransomware demands money.

    InterceptX would have detected nil, for this is a basic form of rootkit, and it has no chance in detecting that.

    As for patches, of course you have to do that, but there are many 0 day attacks delivered by banners.. so I would say, patch, block ads, and not only have a proper onsite backup, but also an online backup system or something you cannnot acces as a share/drive that stores files with versioning.

    It is a bit sad that governments would hoard 0-days, have compromised Tor for their nefarious purposes, yet dont use that to stop cybercriminals.

  2. Anonymous Coward
    Anonymous Coward

    Now if GCHQ/NSA really wanted to prove their worth

    they could go about publishing the decryption keys for ransomware - thus (metaphorically) cutting the scammers off at the knees.

    If they are shy about their capabilities they could do it anonymously and let 4Chan or the like take the credit.

    |I would consider that a spiffing *good* use of their powers, rather than snooping on their own law abiding citizens.

  3. Stuart 22

    Or use Linux?

    I'm presuming I haven't been targetted ... yet! Yesterday's attempt was using an encrypted MS Office template (.dot) file - doh

    How do I know when to start panicking?

    1. JimmyPage
      Mushroom

      Re: Or use Linux?

      One day - it may be tomorrow, it may be 10 years hence, but one day, there will be a wail of dismay from people who thought "just use Linux" was a cure-all for everything.

      It may be *harder* to develop malware for Linux, but by no means impossible. But it's a hell of a lot easier when no one is looking for it because they've checked out of computer security basics.

  4. MJI Silver badge

    Time to come down heavy

    National security risk.

    We have the technology GCHQ

    We have the reply SAS

    Just do it, trace them back and terminate them.

    1. Alumoi Silver badge

      Re: Time to come down heavy

      I just can't wait to see SAS kicking doors at FSB/SVR/GRU/NSA/CIA/FBI/MSS/PLA/BND et all.

  5. Adrian 4
    Trollface

    Business transaction

    “There is the obvious moral and ethical question of whether you want to be paying money to a cybercriminal. But if you show yourself as someone who will pay, you are all the more likely to be targeted again,”

    Sounds just like the approach of a few 'legit' software companies.

This topic is closed for new posts.

Other stories you might like