Skip to main content

Ransomware is the new hot threat everyone is talking about; what do you need to know?

what is ransomware and should you be worried about it shutterstock 223094779
Image Credit: Shutterstock/Wk1003mike
You wake up one day, rub the sleep out of your eyes, and boot up your laptop. Expecting to see a Twitter feed or Facebook profile, instead you’re greeted with a big red image, demanding that if you don’t pay $200 to an unknown party in the next 24-hours, everything you know and love on your computer will be erased, and gone forever.

Welcome to the world of “ransomware,” the newest, hottest way that underground criminals are pulling cash from the pockets of innocent victims and using it to fund their clandestine operations. But what exactly is this ransomware stuff, and is there anything you can do to protect yourself against it?

Recommended Videos

A brief history of ransomeware

As antivirus vendors and security professionals continue to make headway against global malware campaigns on a daily basis, hackers have been looking for more inventive ways of keeping their revenue streams strong without relying on standard credit card fraud techniques.

The result of this effort has come in the form of new viruses like Cryptolocker, Cryptowall, and more recently, TeslaCrypt, which are all members of an increasingly popular family of infections known as “ransomware.” The earliest known version of ransomware, called CryptoLocker, first debuted on the scene around the tail end of 2013, and hit so hard the Internet barely had enough time to figure out what it was dealing with in the first place.

In what seemed like no more than a week, a flood of users were reporting that a new, unknown style of virus had locked down their hard drives, and was demanding a healthy ransom to return control of their most prized files and folders. By capitalizing on the relatively unknown nature of its infection style, ransomware was able to sweep through tens of thousands of computers in a matter of days, spreading through established botnets and infecting users via standard phishing links embedded in email attachments and untrustworthy downloads.

Locker17
Image used with permission by copyright holder

Despite trying system resets, flashing the BIOS, or installing new hard drives altogether, the only screen they would be able to see was the hacker’s flyer which told them how much they needed to pay to regain access, and how long they had left before the format bomb would eventually go off.

Worse, users started reporting that the hackers were making good on their word, and would remove CryptoLocker if the terms had been met in the allotted 24-hour period. This only encouraged more desperate and confused victims to pay the fee instead of looking for an alternative option, which in turn, fueled the spread among criminal organizations who spied a new, quick way to make an easy buck.

Unlike classical malware that installs keyloggers, backdoors, or trojans on a computer in the hopes that a user would eventually type in the details of a credit card or other personal information that could later be used or sold, CryptoLocker and its many subsequent variants offered a simple, and reliable revenue stream that the underground market could capitalize on to fund other, less-profitable operations.

Amounts demanded for the ransom would vary wildly depending on the criminal ring behind it, anywhere from $25 to $600, almost always paid either in Bitcoin, or sent through MoneyGram onto untraceable prepaid cards in Eastern European nations.

The threat goes mobile

Not soon after PCs were experiencing a torrent of total lockdowns, both mobile security firms and mobile phone owners were reporting that the threat had migrated onto select pieces of hardware running Google’s Android operating system, and even a few devices in the iOS ecosystem we subjected to similar attacks.

Mobile ransomware would work much the same as its bigger cousin, locking down a device entirely, with only a message being displayed that demanded an exorbitant sum be paid within a certain amount of time or the phone would be wiped clean.

Luckily, many of the victims of mobile attacks were relatively safe from harm, as most phones and tablets with Android or iOS automatically back up vital internal data like photos, contacts, notes or texts to cloud services every time the device is plugged in for a charge. Sure, they might have lost a couple songs stored on their SD cards, but other than that, the damage caused by mobile ransomware is significantly less pronounced than what we’ve seen on full-fledged PCs.

The solution…sort of

In this respect, there are two simple solutions to making sure you don’t become a target for ransomware, though it should be noted that one carries considerably more risk than the next.

The first is to simply wait to see if you get infected, and if so, hope that one of the major antivirus vendors have created a fix for your specific type of ransomware. What was once an un-defeatable beast of terrifying magnitude has since been wrangled into a much more manageable threat, and many of the top AV companies have provided fixes that you can download and fit on a USB stick to plug in when the ransom screen appears. With enough time to study the patterns and attack paths of ransomware, malware research groups have found several key tactics to penetrate its armor, which thankfully don’t trigger the self-destruct mechanism in the process.

That said, new types of ransomware (much like the malware it’s based off of), are being developed daily, and it’s nearly impossible for AV companies to account for every different style as they emerges in real time. If you happen to get caught in the web of a new ransomware, your chances of getting your data back unharmed are unfortunately slim to none, unless you give in to the hacker’s demands.

The second method of prevention is much more secure, and in our opinion, the only way to go when it comes to malware.

Back. Up. Everything.

At its core, ransomware exploits people’s unwillingness to back up their most precious data and files onto a separate hard drive that is completely disconnected from their main PC or network. By not creating separate carbon copies of their photo albums, music, programs, or documents, this type of malware can hold these folders hostage, and expect you to pay because it’s the only version you have in existence.

By backing up your operating system and all its contents to an air-gapped external hard drive every single day, you completely mitigate the risk of ransomware by circumventing the tool it uses to get you to pay up in the first place.

Imagine if a real live hacker came into your house at night, stole your computer, and then called you in the morning with demands to “pay up, or the PC gets it.” Little do they know, you had another identical computer waiting for just such an emergency in your closet. You could tell them to keep what they took, and just pull out the new tower and go about enjoying the rest of your day.

That’s the level of security from ransomware you can have as long as you remember to backup all of your data once a day, every day, and be sure to disconnect the drive when you’re done.

Alternatively, you can use a cloud storage solution or backup service to provide the same level of protection. This too will prevent you from becoming a victim of ransomware, and it’s often easier than backing up to a hard drive every day or week. On the downside, such services are much more expensive over time than a hard drive, so you pay for their convenience.

Conclusion

When ransomware first hit, it sent a shockwave through the security industry and claimed tens of thousands of computers as a result.

Since then, we’ve adapted. We’ve studied the tactics of the hackers, and maneuvered through their nonsense to create a system of users and protectors that are ready for whatever the underworld might have to throw our way.

Ransomware is still a problem, sure. Yes, it still claims tens of thousands of PCs, laptops, and mobile devices per year, but it’s not anywhere near the threat that it used to be, and its overall impact grows smaller by the day.

As long as you’re prepared, you can stay one step ahead of ransomware, and simply shake it off like a bad cold if it ever shows up on your doorstep uninvited.

Chris Stobing
Former Digital Trends Contributor
Self-proclaimed geek and nerd extraordinaire, Chris Stobing is a writer and blogger from the heart of Silicon Valley. Raised…
Best early GPU Black Friday deals: Save on top graphics cards now
The Gigabyte RX 6750 GRE graphics card over a dark background.

Building a PC from scratch can be a lot of fun, and with the upcoming Black Friday on November 29, it's a perfect time for you to pick up hardware. One of the most fun bits of any build is picking the parts, and for that, graphics cards are probably the most fun to pick between. That said, GPUs also tend to be the most expensive pieces of hardware that go into a desktop, especially if you're trying to aim for something in the mid-to-high-end range that can easily reach $500 or even $1,000. That's why we've gone out and collected some of our favorite early Black Friday GPU deals for you below.
GIGABYTE NVIDIA GeForce RTX 3060 -- $290 $350 17% off

This RTX 3060 is a great starter card for those who want to be on a budget and will handle most slightly older games pretty well at 1080p and 60Hz, potentially up to 100. It may struggle a bit with newer titles without compromises, but that's fine given the reduced $290 price point.

Read more
Nvidia just scaled down DLSS 3, and that’s a good thing
The RTX 4080 Super graphics card sitting on a pink background.

Nvidia's signature tech, DLSS 3, just got yet another update -- and although it's subtle, it actually seems like a good thing for some of the best graphics cards. The latest version, 3.8.10, bundled with the GeForce 566.14 driver, doesn't seem to introduce any major changes, but Nvidia enthusiasts noticed that it's about half the size that it used to be. Where's that difference coming from?

No, Nvidia didn't downgrade DLSS 3 -- at least not in any major way. Although this hasn't been confirmed by Nvidia itself, it appears that the company removed a whole bunch of DLSS presets and replaced them with just two. These presets make it easier for gamers to choose the type of focus they want to apply to each game.

Read more
HP has an entirely new take on laptops with foldable screens
HP Spectre Foldable PC front view showing full length display and separate keyboard.

HP has released a patent detailing ideas for its latest take on a foldable laptop, as spotted by MSPoweruser. According to the diagrams in the document, the device would close like a many of the conventional best laptops, and then the sides of the extra-wide display would fold around the bottom of the PC.

When closed, the device would be about the size of a normal laptop, just a little thicker. The diagrams are drawn for clarity, however, and don't reflect how thick the product would actually be.

Read more