Exploring Ransomware History and Origins Are Key To Understanding Modern Tactics

THE AUTHOR

Cary Kostka
March 14, 2022

Exploring Ransomware History and Origins Are Key To Understanding Modern Tactics

Ransomware attacks are increasing at an alarming rate worldwide. In response, knowledge of ransomware history and ransomware origins must also increase. This will help you respond better if you or your business falls victim to an attack.

Ransomware: A Quick History

The ransomware origin timeline starts with the AIDS Trojan in 1989. From there, ransomware grew very quiet, with only fragmented or inconsequential attacks being attempted. However, as the ability to harness always-on connectivity and social media outlets grew, so did the prevalence of ransomware.

CryptoLocker, which emerged in 2013, introduced a historic turning point in ransomware. This attack disabled more than 250,000 computers and generated at least $3 million for its creators. Attacks have grown both in frequency and in the damage they cause. WannaCry (2017) caused an estimated $4 billion in losses. And just last year, three notable attacks (on Colonial Pipeline, JBS, and Kaseya) caused widespread infrastructure and business outages.

The financial incentive for carrying out these attacks has only increased over the course of ransomware history. The arrival of cryptocurrencies has made it easier for attackers to enjoy the financial benefits of their work, while also making it increasingly difficult for law enforcement to hone in on these nefarious parties.

What Do Notable Ransomware Attacks Have in Common?

In following the timeline of ransomware history, there are commonalities that can help us better understand the ins and outs of ransomware:

  • Social engineering from attackers tricks victims into executing attacks via email or platforms such as Facebook
  • Attacks take advantage of known product vulnerabilities, including operating systems
  • Ransom notifications put most tech support instructions to shame
  • Ransomware attacks are driven by financial rewards and ego

As the tools used by malicious parties mature, these attributes can still be used to define how attacks are carried out. Whether the ransomware tool is homegrown or purchased from a ransomware-as-a-service (RaaS) provider, the rules governing ransomware attacks have remained unchanged for more than 30 years. We can use this established framework to better prepare ourselves to defend against an attack before one can take place.

What Can We Get from History to Help Us Be Better Prepared?

The saying that history repeats itself is very much true when applied to ransomware attacks. Ransomware toolkits are designed to target specific user behaviors, common technology vulnerabilities, and unchanged default security configurations. Initiators of ransomware attacks will continue to use technical and/or human vulnerabilities to execute damaging attacks.

All this needs to change if we’re to start taking ground back from the malicious parties who employ ransomware to achieve financial and destructive goals. These attack modes will remain unchanged until we adjust our habits and attitudes when engaging with technology.

The clues of the past that are revealed from knowing ransomware’s origins continue to provide the signposts for fighting ransomware. From these we can continue to build strategies that harden technology against attacks and provide education to technology users.

Sign Up For Our Newsletter

Don't worry, we hate spam too!

Other Articles You May Be Interested In:

Get Help Preparing For; Preventing;

Or Recovering From Ransomware Now

Get The Latest On Ransomware 
Right In Your Inbox

Sign Up To Receive Our 
Monthly Ransomware Newsletter

envelope
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram
Share via
Copy link
Powered by Social Snap