In one of the most high-profile ransomware attacks of recent times, Colonial Pipeline, the largest petroleum pipeline in the U.S., was attacked. Following the attack, the company had to shut operations for several days. To bring their systems back online, they ended up paying a ransom of 75 bitcoins (approx $4.4 million).
This attack highlighted the increasing vulnerability of firms to ransomware attacks. In 2019, over 200,000 U.S. firms were compromised by ransomware – a serious number by any standards. But then, in the first half of 2020, global ransomware attacks increased by 715% YoY.
So, what is ransomware?
How does ransomware work?
How does ransomware spread?
In this article, we address all these questions about this increasingly common cyber threat.
Ransomware is a kind of malware (malicious software) that a bad actor installs on a victim’s system without their knowledge. It then encrypts their files or data, and locks them out of the system. To decrypt these locked files, the criminal demands a ransom from the victim.
In 2020, ransom payouts touched nearly $350 million in cryptocurrencies, a 311% increase over 2019. Ransomware attacks often yield such huge payouts for attackers because they’re easy to set up, and require almost no technical or coding skills. As long as the threat actor can access the Dark Web, they can buy ready-to-use ransomware toolkits or a Ransomware-as-a-Service (RaaS) subscription to easily author and launch an attack.
Ransomware works on the basis of asymmetric encryption that uses two keys – a public key and a private key. The attacker generates this unique key pair for the victim. They send the private key to the victim only after they pay the ransom – or so they say. In many cases, the victim never receives the private key, so they lose access to their files or data forever. Between 2020 and 2021, the number of organizations that paid the ransom rose from 26% to 32%, but only 8% got all of their data back.
There are several possible vectors for ransomware infections. A malicious actor may, for example, distribute ransomware using email phishing. The victim receives a ransomware-infected attachment. Once they open it, the ransomware is installed on their system, and the game begins.
Other possible ransomware attack vectors include:
Sometimes attackers launch ransomware to exploit network vulnerabilities, and spread to other systems across the organization. This kind of lateral movement can be especially dangerous, because it now involves unlocking and recovering data for not just one device, but multiple devices.
As we mentioned above, ransomware is easily available to any script kiddie who has the means to acquire it (a script kiddie is someone who can acquire and use a malicious program or code with little to no expertise). With good generic interpreters, they can create cross-platform ransomware, which can spread easily in a very short time. They can also leverage new techniques to encrypt complete hard disks, allowing them to expand the scope and scale of their attacks.
This ransomware encrypts hard drives, folders and files. Attackers then demand a ransom with the promise of decrypting the data.
It infects the device operating system to completely lock the user out. The lock screen displays the ransom demand, often with a countdown timer, which is used to create a sense of urgency.
This fake software dupes a victim into thinking there are security issues on their device, and demands money to eliminate them.
It hijacks a device, and threatens to publish the user’s sensitive information online unless they pay a ransom.
Over the years, many ransomware strains have evolved, and continue to cause problems for organizations (and individuals) all over the world. The most well-known ransomware strains are:
It’s hard to trace ransomware perpetrators, especially if they demand ransom in anonymous cryptocurrencies. Moreover, modern ransomware is polymorphic, allowing attackers to bypass traditional signature-based security.
However, it is possible to prevent ransomware attacks, or at least minimize their impact by following these best practices:
If a system is infected with ransomware, it’s vital to act quickly to mitigate its impact. The important actions to take are:
If neither backups nor decryption keys are available, the only option is to accept that the files and data are lost forever, and start rebuilding the system from scratch. This can be a painful process, which is why it’s crucial to take regular backups. Periodic vulnerability scans and penetration tests are also a proactive way to find possible weaknesses that may leave the organisation vulnerable to ransomware..
We hope this article answers your question: what is ransomware?
In 2019, ransomware caused $11.5 billion in global damage. In 2020, this figure jumped to $20 billion. Ransomware is now a lucrative business, and companies everywhere are vulnerable to it. That’s why they must take preventive action to protect themselves and their customers from this threat.