In cybersecurity and tech circles, however, ransomware has long been talked about for all too long already.

According to US government figures, ransomware attacks since 2005 have outnumbered online data breaches.

WannaCry changed all of that.

A History of the Ransomware Threat: Past, Present and Future

What is Ransomware?

First of all, some definitions.

Ransomware falls into a class of malware designed specifically for financial gain.

Article image

Unfortunately for the victims, the effects of ransomware are only too real.

Ransomware works by disrupting the operation of a computer system, rendering it unusable.

The perpetrators then send a ransom note to the owners, demanding money in return for reversing the changes.

Article image

Most examples of ransomware fall into one of two categories.

In 1989, a Harvard academic named Joseph L Popp was attending a World Health Organization conference on AIDS.

After 90 reboots, the virus kickstarted into life, promptly encrypting files and hiding directories.

Article image

Popp himself was arrested but never faced trial due to poor mental health.

GPCoder

One of the first examples of ransomware distributed online was the GPCoder Trojan.

First identified in 2005, GPCoderinfected Windows systems and targeted files with a variety of extensions.

medal

Once found, the files were copied in encrypted form and the originals deleted from the system.

In theory, this meant the victim could still use the computer and any files stored in other folders.

The first signs of change started to appear in 2009.

medal

That year, a known scareware virus called Vundo switched tactics and began to function as ransomware.

This was a first indication that hackers were starting to feel there was money to be made from ransomware.

Plus, of course, the sophistication of the ransomware itself was growing.

medal

By 2011, the trickle had become a torrent.

In the first quarter of that year, there were 60,000 new ransomware attacks detected.

Trojan WinLock

In 2011, a new form of ransomware emerged.

medal

The WinLock Trojan is considered to be the first widespread example of what became known as Locker ransomware.

The WinLock Trojan started a trend for ransomware which imitated genuine products, echoing the old scareware tactic.

The unit would be locked as confiscation until some sort of bribe or fine was paid.

Article image

One of the most famous examples of police ransomware was known as Reveton.

Payment was taken through pre-paid electronic token services like MoneyPak and Ukash.

This tactic was picked up by other police ransomware such as Urausy and Kovter.

Article image

For one, it didnt bother with the chicanery and con-artist tactics of scareware or police ransomware.

Thirdly, CryptoLocker broke new ground in how it was distributed.

CryptoLocker, therefore,marked the first example of ransomware being spread via infected websites.

Article image

All of these features have become dominant characteristics of ransomware attacks since, influenced by how successful CryptoLocker was.

CryptoWall also confirmed the growing roleBitcoinwas playing in ransomware attacks.

By 2014,the crypto-currency was the payment method of choice.

Article image

By 2015,CryptoWall alone was estimated to have generated $325 million.

Android attacks

Another major step in the ransomware story was thedevelopment of versions targeting mobile devices.

These were exclusively aimed at Android devices at first, making use of the open source Android code.

Article image

The first examples appeared in 2014 and copied the police-ware format.

One early example was a kit based on the Pletor Trojan which was sold for $5000 online.

2016: The Threat Evolves

2016 was to be a seminal year for ransomware.

Article image

Automatic loading on reboot maximizes the chances of this happening.

Multiplatform

2016 also saw the arrival of the first ransomware script to affect Mac systems.

Shortly after KeRanger, the first ransomware capable of infecting multiple operating systems emerged.

WannaCry confirmed those fears, creating headlines around the world.

But WannaCry is far from the only ransomware threatening computer users this year.

Within hours, it had spread to hundreds of computers in dozens of countries.

WannaCry is short for WannaCrypt, referencing the fact that WannaCry is crypto-ware.

More specifically, it is a cryptoworm, able to replicate and spread automatically.

Instead, WannaCry marked a new phase in ransomware targeting known vulnerabilities on computers.

This was also why it grabbed so many headlines.

In effect, WannaCry was built on a system developed by a state security agency.

What does the future hold for ransomware?

So what can we expect?

One big concern is the potential for ransomwareto start targeting digital devices other than computers and smartphones.

In this way, the ability of ransomware to directly affect our daily lives will only increase.

Another possibility is that ransomware will switch in focus away from individual devices and their users.

Can a VPN Prevent Ransomware Attacks?

There are many advantages of a VPN.

Owing to these factors, using a VPN keeps you more secure from malware, including Ransomware.

There are a lot of VPN services to choose from.

If you’re looking for a VPN, check out ourmost recommended VPNsfrom trusted users.

Your data is exposed to the websites you visit!

Visit ExpressVPN

just, comment on how to improve this article.