In cybersecurity and tech circles, however, ransomware has long been talked about for all too long already.
According to US government figures, ransomware attacks since 2005 have outnumbered online data breaches.
WannaCry changed all of that.
What is Ransomware?
First of all, some definitions.
Ransomware falls into a class of malware designed specifically for financial gain.
Unfortunately for the victims, the effects of ransomware are only too real.
Ransomware works by disrupting the operation of a computer system, rendering it unusable.
The perpetrators then send a ransom note to the owners, demanding money in return for reversing the changes.
Most examples of ransomware fall into one of two categories.
In 1989, a Harvard academic named Joseph L Popp was attending a World Health Organization conference on AIDS.
After 90 reboots, the virus kickstarted into life, promptly encrypting files and hiding directories.
Popp himself was arrested but never faced trial due to poor mental health.
GPCoder
One of the first examples of ransomware distributed online was the GPCoder Trojan.
First identified in 2005, GPCoderinfected Windows systems and targeted files with a variety of extensions.
Once found, the files were copied in encrypted form and the originals deleted from the system.
In theory, this meant the victim could still use the computer and any files stored in other folders.
The first signs of change started to appear in 2009.
That year, a known scareware virus called Vundo switched tactics and began to function as ransomware.
This was a first indication that hackers were starting to feel there was money to be made from ransomware.
Plus, of course, the sophistication of the ransomware itself was growing.
By 2011, the trickle had become a torrent.
In the first quarter of that year, there were 60,000 new ransomware attacks detected.
Trojan WinLock
In 2011, a new form of ransomware emerged.
The WinLock Trojan is considered to be the first widespread example of what became known as Locker ransomware.
The WinLock Trojan started a trend for ransomware which imitated genuine products, echoing the old scareware tactic.
The unit would be locked as confiscation until some sort of bribe or fine was paid.
One of the most famous examples of police ransomware was known as Reveton.
Payment was taken through pre-paid electronic token services like MoneyPak and Ukash.
This tactic was picked up by other police ransomware such as Urausy and Kovter.
For one, it didnt bother with the chicanery and con-artist tactics of scareware or police ransomware.
Thirdly, CryptoLocker broke new ground in how it was distributed.
CryptoLocker, therefore,marked the first example of ransomware being spread via infected websites.
All of these features have become dominant characteristics of ransomware attacks since, influenced by how successful CryptoLocker was.
CryptoWall also confirmed the growing roleBitcoinwas playing in ransomware attacks.
By 2014,the crypto-currency was the payment method of choice.
By 2015,CryptoWall alone was estimated to have generated $325 million.
Android attacks
Another major step in the ransomware story was thedevelopment of versions targeting mobile devices.
These were exclusively aimed at Android devices at first, making use of the open source Android code.
The first examples appeared in 2014 and copied the police-ware format.
One early example was a kit based on the Pletor Trojan which was sold for $5000 online.
2016: The Threat Evolves
2016 was to be a seminal year for ransomware.
Automatic loading on reboot maximizes the chances of this happening.
Multiplatform
2016 also saw the arrival of the first ransomware script to affect Mac systems.
Shortly after KeRanger, the first ransomware capable of infecting multiple operating systems emerged.
WannaCry confirmed those fears, creating headlines around the world.
But WannaCry is far from the only ransomware threatening computer users this year.
Within hours, it had spread to hundreds of computers in dozens of countries.
WannaCry is short for WannaCrypt, referencing the fact that WannaCry is crypto-ware.
More specifically, it is a cryptoworm, able to replicate and spread automatically.
Instead, WannaCry marked a new phase in ransomware targeting known vulnerabilities on computers.
This was also why it grabbed so many headlines.
In effect, WannaCry was built on a system developed by a state security agency.
What does the future hold for ransomware?
So what can we expect?
One big concern is the potential for ransomwareto start targeting digital devices other than computers and smartphones.
In this way, the ability of ransomware to directly affect our daily lives will only increase.
Another possibility is that ransomware will switch in focus away from individual devices and their users.
Can a VPN Prevent Ransomware Attacks?
There are many advantages of a VPN.
Owing to these factors, using a VPN keeps you more secure from malware, including Ransomware.
There are a lot of VPN services to choose from.
If you’re looking for a VPN, check out ourmost recommended VPNsfrom trusted users.
Your data is exposed to the websites you visit!
Visit ExpressVPN
just, comment on how to improve this article.