Previous All Posts Next

Ransomware Evolution: Why Threats Are Worse

Posted: February 1, 2017 to Cybersecurity.

Tags: Ransomware, Malware, Data Breach

You know that annoying little kid who hits a growth spurt and then seemingly overnight transforms from a nuisance into a menacing bully? That bully is ransomware, the growth spurt was 2016, and it doesn’t appear that 2017 will be any easier. Ransomware was not kind as a child; in the beginning, the strategy involved locking down victims’ computer files, and refusing to unlock the imprisoned data until a ransom was paid. Many victims, however, started to catch on and came prepared with countermeasures that allow victims to restore the information on their computer without having to pay a ransom. And like any great villain who wishes to remain relevant, necessity is the mother of all inventions. Criminal programmers have now created ransomware/malware hybrids that work in tandem to not just lock down files (which can be restored) but to also syphon personal data from the computer. As if that wasn’t enough, the newest ransomware is coded to boot the system into a lock screen displaying the ransom note, and nothing else. This means that, regardless of the safety measures taken, the target will be left with only two options:
  1. Pay
  2.  Lose access to your entire system
With these new, souped-up versions, ransomware is not going anywhere. In fact, ransomware, that accounted for only one-fifth of all malware payouts just 12 short months ago, has apparently been working out and beefing up by increasing nearly 270% and becoming the reason for nearly ⅔ of all payouts. Because unlike other malware, all it takes to effectively execute ransomware is the ability to purchase it. In fact, any criminal looking to cash in on this trend in 2016 most likely contacted one of three programming families: TeslaCrypt, Locky, and Cerber. TeslaCrypt was the undisputed leader of the pack until June, when its master decryption key was released, rendering the ransomware effectively useless. No matter, Cerber and Locky were more than happy to fill the void. Cerber became popular for its ease of use, and Locky for its more complicated, nefarious uses, and seems to be taking the market share lead after a slight dip in use over Christmas. It should come as no surprise that Western, developed countries are the main targets, especially with the drama that was 2016’s US presidential race. The most targeted countries were (in order):
  1. The US
  2. Germany
  3. Italy
  4. UK
  5. France
Conspicuously absent is Russia, whose citizens are believed to be the main perpetrators of this crime. Their absence from this list seems to be just one more bit of proof, as they most likely do not wish to harm their own people.

Protect Your Business Today

Petronella Technology Group has provided cybersecurity, compliance, and managed IT services from Raleigh, NC for over 23 years. Contact us today for a free consultation and technology assessment.

Need help implementing these strategies? Our cybersecurity experts can assess your environment and build a tailored plan.
Get Free Assessment

About the Author

Craig Petronella, CEO and Founder of Petronella Technology Group
CEO, Founder & AI Architect, Petronella Technology Group

Craig Petronella founded Petronella Technology Group in 2002 and has spent more than 30 years working at the intersection of cybersecurity, AI, compliance, and digital forensics. He holds the CMMC Registered Practitioner credential (RP-1372) issued by the Cyber AB, is an NC Licensed Digital Forensics Examiner (License #604180-DFE), and completed MIT Professional Education programs in AI, Blockchain, and Cybersecurity. Craig also holds CompTIA Security+, CCNA, and Hyperledger certifications.

He is an Amazon #1 Best-Selling Author of 15+ books on cybersecurity and compliance, host of the Encrypted Ambition podcast (95+ episodes on Apple Podcasts, Spotify, and Amazon), and a cybersecurity keynote speaker with 200+ engagements at conferences, law firms, and corporate boardrooms. Craig serves as Contributing Editor for Cybersecurity at NC Triangle Attorney at Law Magazine and is a guest lecturer at NCCU School of Law. He has served as a digital forensics expert witness in federal and state court cases involving cybercrime, cryptocurrency fraud, SIM-swap attacks, and data breaches.

Under his leadership, Petronella Technology Group has served 2,500+ clients, maintained a zero-breach record among compliant clients, earned a BBB A+ rating every year since 2003, and been featured as a cybersecurity authority on CBS, ABC, NBC, FOX, and WRAL. The company leverages SOC 2 Type II certified platforms and specializes in AI implementation, managed cybersecurity, CMMC/HIPAA/SOC 2 compliance, and digital forensics for businesses across the United States.

CMMC-RP NC Licensed DFE MIT Certified CompTIA Security+ Expert Witness 15+ Books
Related Service
Protect Your Business with Our Cybersecurity Services

Our proprietary 39-layer ZeroHack cybersecurity stack defends your organization 24/7.

Explore Cybersecurity Services
Previous All Posts Next
Free cybersecurity consultation available Schedule Now