Ransomware- A RANSOM GAME

By Abhay Verma | Posted on: October 15, 2020

You might be familiar with the image shown above. The locked computer device with a pop up asking for a ransom to unlock the device. This is what Ransomware or Ransom Malware is.

Image Source:ISEA

Ransomware is a malicious application that employs cryptography techniques to hold control of the victim's PC. A ransomware encrypts and locks the legitimate user's access to the computer system, and in exchange to decrypt data, the attacker demand ransom in the form of cryptocurrency, like Bitcoin.

The malware hostage the victim’s personal files, although the files remain on the device but are inaccessible by the user. In most cases, a time is given to the victim to pay the ransom and get the unlock key, or the device will be locked permanently.


How Ransomware Works?

The ransomware and many other malware are generally distributed via a flooding spam mails or targeted attack. The malware needs an attack vector to establish its presence in the end device. Once the presence is established, the malware starts exploiting and deploying a malicious binary in the infected machine.

Ransomware uses the asymmetric encryption method. This method includes using two keys, i.e., public-private key pair- one to encrypt file and the other to decrypt it. The attacker generates the key pair and provides the private key for decryption only if the victim pays the ransom. Without the private key, it is almost impossible to break the encryption.

“Kaspersky security experts have been able to decrypt hijacked data, but they admit it isn’t always possible if the encryption is very strong, as is the case with CryptoLocker.”

(Source:Kaspersky)

The ransomware is designed so that it spreads rapidly in the network and affects the databases and file servers. The files are encrypted. Ransomware prompt to pay under 24 or 48 hours to decrypt the files; else, they are lost forever.

Ransomware Timeline


Ransomware is not a fancy term; it has been in action since the 1980s and has been evolving. Initially, when ransomware targeted individuals, it now targets big businesses to yield a more significant amount. Some notable ransomware in history are as-

  1. PC Cyborg (Also known as AIDS Trojan) in the late 1980s: The first-ever known ransomware, released by AIDS researcher Joseph Popp. He distributed 20,000 floppy disk of containing malware to other AIDS researchers, and very few of them knew that the malware would lock the C drive after 90 reboots and ask to renew the license by paying $189 by mail to PC Cyborg Corp.

  2. GpCode in 2004: The malware implemented a weak form of RSA encryption on the victim's machine for ransom.

  3. WinLock in 2007: The malware was different from all others, so that instead of encrypting the data, it locked victim out of the desktop and displayed pornographic images on the desktop. Victims need to pay for removing the photos.

  4. Reveton in 2012: This “so-called law enforcement” ransomware locked the victim's PC and displayed a real-looking fake screen from a law enforcement agency. The message stated the victim has committed some crime and told them to pay the fine via a prepaid card.

  5. CryptoLocker in 2013: CryptoLocker ransomware used the military-grade encryption that used the remote server to store the key required for decryption. The attack infiltrated about 250,000 systems and reaped $3 million before taken offline.

  6. Locky in 2016: The malware includes the social engineering tactics to deliver itself via a mail, which consists of a Microsoft Work document attachment, which looks like some bill to be paid. But it was a malicious macros. The ransomware has evolved so much that it can use JavaScript files, which cannot be even detected by anti-malware products.

  7. WannaCry in 2017: The ransomware WaanaCry in May 2017 and Petya in June 2017 was the encryption ransomware, which anonymously spread between computers.

  8. Sodinokibi in 2019: The cybercriminals used the managed service providers (MSP) like dental offices to spread infection.


Are Mobile Devices SAFE from Ransomware?


It’s a clear-cut answer--- NO.


After the CryptoLocker, the ransomware was seen on an extensive scale in mobile devices. Mobile ransomware is delivered via a malicious mobile app. The malware displays a message that the device has been locked due to some illegal activities. Also, the message conveyed that the device will unlock once the fee is paid. To regain access to the mobile device, it was required to boot the machine in safe mode and remove the infected app.


Types of Ransomware


There are various types of ransomware which differ on the harm causing intensities, some are more harmful while some are less, but they all have one thing in common- a ransom. Some of the ransomware types are:

  1. Crypto Malware: These types of malware encrypt the victim's personal files, folders, and hard-drives and are considered as the most harmful. The 2017 WannaCry ransomware attack is a well familiar example.

  2. Lockers: These types of ransomware are designed for infecting the operating system and make victim lockout of all computer resources and files.

  3. Scareware: Scareware is a malware that plays with human's fear. It scares the user by claiming that viruses are found or slow system performance and force the user to download an antivirus application, which in reality is ransomware.

  4. Doxware: Also known as leakware or extortionware. As the name suggests, these ransomware threatens the victim to publish the stolen information if ransom is not paid.

  5. RaaS: You must have heard of SaaS, IaaS, PaaS in cloud computing, but RaaS is not related to that. It stands for ‘Ransomware-as-a-Service’. It is a type of malware anonymously hosted by the hacker but is purchased or rented by anyone. The cybercriminals manage everything- from deployment to collect payment and decryption of the files.

  6. Mac Ransomware: KeRanger, in 2016, affected the Apple user systems through an app called ‘Transmission.’

  7. Mobile Ransomware

Get to know about general MALWARE


Defend Against Ransomware


“Geographically, ransomware attacks are still focused on western markets, with the UK, US, and Canada ranking as the top three countries targeted, respectively.”

Source: Malwarebytes

Still, everyone needs to be aware of the threats and the solutions to mitigate such risks. Some of the steps that can prevent an individual as well as an organization against such attacks:

What if I'M UNDER ATTACK?


Anyhow, if you become the victim of a ransomware attack, the first thing to keep is Calm. Keep calm and watch for the best possible chances to minimize damage and return to normal:

Every day a new variant of ransomware is appearing. It's good or say better to remain informed and aware of the possible threats, damages, dos, and don’ts so that you can minimize your exposure towards the attacks. It can help you keep your files, databases, information, and yourself safe from the “BAD GUYS.”



"...REMAIN VIGILANT, REMAIN SECURE..."

- See you soon.
CyVIN TECH