This article explores the history of ransomware, a type of malware used by cybercriminals to lock files and demand payment for their release. It details its evolution from its early days in the 1980s, when it was a rudimentary concept, to its current status as a billion-dollar industry.
Dating back to the 1980s, ransomware is a form of malware used by cybercriminals to lock files on a person's computer and demand payment to unlock them. The technology — which officially turned 35 in December — has come a long way, with criminals now able to spin up ransomware much faster and deploy it across multiple targets.
Experts expect ransomware to evolve even further, with modern-day cloud computing tech, artificial intelligence and geopolitics shaping its future. Ransomware is now a billion-dollar industry. But it wasn't always that large — nor was it a prevalent cybersecurity risk like it is today.Dating back to the 1980s, ransomware is a form of malware used by cybercriminals to lock files on a person's computer and demand payment to unlock them. The technology — which officially turned 35 on Dec. 12 — has come a long way, with criminals now able to spin up ransomware much faster and deploy it across multiple targets.Jeju Air crash that killed 179 prompts South Korea to probe country's airline operation system A hacker physically mailed floppy disks claiming to contain software that could help determine whether someone was at risk of developing AIDs. Feeling out of the loop? We'll catch you up on the Chicago news you need to know. Sign up for the weekly However, when installed, the software would hide directories and encrypt file names on people's computers after they'd rebooted 90 times. It would then display a ransom note requesting a cashier's check to be sent to an address in Panama for a license to restore the files and directories."It was the first ransomware and it came from someone's imagination. It wasn't something that they'd read about or that had been researched," Martin Lee, EMEA lead for Talos, the cyber threat intelligence division of IT equipment giant Cisco, told CNBC in an interview. "Prior to that, it was just never discussed. There wasn't even the theoretical concept of ransomware." The perpetrator, a Harvard-taught biologist named Joseph Popp, was caught and arrested. However, after displaying erratic behavior, he was found unfit to stand trial and returned to the United States.Since the AIDs Trojan emerged, ransomware has evolved a great deal. In 2004, a threat actor targeted Russian citizens with a criminal ransomware program known today as"GPCode." The program was delivered to people via email — an attack method today commonly known as"phishing." Users, tempted with the promise of an attractive career offer, would download an attachment which contained malware disguising itself as a job application form. Once opened, the attachment downloaded and installed malware on the victim's computer, scanning the file system and encrypting files and demanding payment via wire transfer.In 2013, only a few years after the creation of bitcoin, the CryptoLocker ransomware emerged. Hackers targeting people with this program demanded payment in either bitcoin or prepaid cash vouchers — but it was an early example of how crypto became the currency of choice for ransomware attackers. Later, more prominent examples of ransomware attacks that selected crypto as the ransom payment method of choice included the likes of "Cryptocurrencies provide many advantages for the bad guys, precisely because it is a way of transferring value and money outside of the regulated banking system in a way that is anonymous and immutable," Lee told CNBC."If somebody's paid you, that payment can't be rolled back." CryptoLocker also became notorious in the cybersecurity community as one of the earliest examples of a"ransomware-as-a-service" operation — that is, a ransomware service sold by developers to more novice hackers for a fee to allow them to carry out attacks. "In the early 2010s, we have this increase in professionalization," Lee said, adding that the gang behind CryptoLocker were"very successful in operating the crime."As the ransomware industry evolves even further, experts are predicting hackers will only continue to find more and more ways of using the technology to exploit businesses and individuals.Some experts worry AI has lowered the barrier to entry for criminals looking to create and use ransomware. Generative AI tools like OpenAI's ChatGPT allow everyday internet users to insert text-based queries and requests and get sophisticated, humanlike answers in response — and many programmers are even using it to help them write code."We have to arm ourselves with the same tools that the bad guys are using," Beck said."The bad guys are going to be using the same tooling that is being used alongside all that kind of change today.""There's a lot of hypothesis about AI being very good for social engineering," Lee told CNBC."However, when you look at the attacks that are out there and clearly working, it tends to be the simplest ones that are so successful."A serious threat to watch out for in future could be hackers targeting cloud systems, which enable businesses to store data and host websites and apps remotely from far-flung data centers. "We haven't seen an awful lot of ransomware hitting cloud systems, and I think that's likely to be the future as it progresses," Lee said. We could eventually see ransomware attacks that encrypt cloud assets or withhold access to them by changing credentials or using identity-based attacks to deny users access, according to Lee."Over the last 10 years, the distinction between criminal ransomware and nation-state attacks is becoming increasingly blurred, and ransomware is becoming a geopolitical weapon that can be used as a tool of geopolitics to disrupt organizations in countries perceived as hostile," Lee said. "I think we're probably going to see more of that," he added."It's fascinating to see how the criminal world could be co-opted by a nation state to do its bidding.""There is still scope for there to be more ransomwares out there that spread autonomously — perhaps not hitting everything in their path but limiting themselves to a specific domain or a specific organization," he told CNBC."I think we will increasingly see the ransomware ecosystem becoming increasingly professionalized, moving almost exclusively towards that ransomware-as-a-service model," he said. But even as the ways criminals use ransomware are set to evolve, the actual makeup of the technology isn't expected to change too drastically in the coming years. "Outside of RaaS providers and those leveraging stolen or procured toolchains, credentials and system access have proven to be effective," Jake King, security lead at internet search firm Elastic, told CNBC.
Ransomware Cybersecurity Malware History Technology
United States Latest News, United States Headlines
Similar News:You can also read news stories similar to this one that we have collected from other news sources.
Russia Charges Hacker Wanted by FBI Over Ransomware AttacksMikhail Matveev 'allegedly used multiple ransomware variants to attack critical infrastructure around the world,' said the DOJ.
Read more »
PIH Health hospitals targeted in ransomware attackBecause of the attack, PIH officials decided to shut their entire network offline, leaving millions without immediate access to their care.
Read more »
The Persistent Ransomware Threat: 2024 Trends And High-Profile AttacksRansomware dominates headlines as one of the most pervasive threats to businesses across the globe. Explore evolving risks, attack trends and financial impacts.
Read more »
Dick Van Dyke Turns 99 as Taylor Swift Turns 35Dick Van Dyke and Taylor Swift will celebrate milestone birthdays on the same day.
Read more »
Forget The Drones, Rhode Island Attacked By Very Real RansomwareAs social media hysteria about so-called mass drone sightings continues, ransomware attacks are a real and present danger as Rhode Island residents have discovered.
Read more »
Ransomware: From Floppy Disks to Billion-Dollar IndustryThis article explores the history of ransomware, tracing its evolution from a rudimentary concept in the 1980s to a sophisticated and lucrative cybercrime today.
Read more »
