Ransomware is one of the biggest cybersecurity problems on the internet and one of the biggest forms of cybercrime that organisations face today. Ransomware is a form of malicious software – malware – that encrypts files and documents on anything from a single PC all the way up to an entire network, including servers.
Victims are left with few choices; they can either regain access to their encrypted network by paying a ransom to the criminals behind the ransomware attack, restore data the from their backups, or hope that there is a decryption key freely available. Or they start again from scratch.
Some ransomware infections start with someone inside an organisation clicking on what looks like an innocent attachment that, when opened, downloads the malicious payload and encrypts the network.
Other, much larger ransomware campaigns use software exploits and flaws, cracked passwords and other vulnerabilities to gain access to organisations using weak points such as internet-facing servers or remote-desktop logins to gain access. The attackers will secretly hunt through the network until they control as much as possible – before encrypting all they can.
It can be a headache for companies of all sizes if vital files and documents, networks or servers are suddenly encrypted and inaccessible. Even worse, after you are attacked with file-encrypting ransomware, criminals will brazenly announce they're holding your corporate data hostage until you pay a ransom in order to get it back. Some will even publish stolen data for all to see on the internet.
It might sound too simple, but the strategy is working – to such an extent that Lindy Cameron, head of the UK's National Cyber Security Centre (NCSC), described ransomware as "the the most immediate cybersecurity threat" to businesses and an issue which needs to be higher on boardroom agendas.
Known as AIDS or the PC Cyborg Trojan, the virus was sent to victims – mostly in the healthcare industry – on a floppy disc. The ransomware counted the number of times the PC was booted: once it hit 90, it encrypted the machine and the files on it and demanded the user 'renew their license' with 'PC Cyborg Corporation ' by sending $189 or $378 to a post office box in Panama.
How did ransomware evolve?
This early ransomware was a relatively simple construct, using basic cryptography that mostly just changed the names of files, making it relatively easy to overcome.
But it effectively created a new branch of computer crime, which slowly, but surely, grew in reach – and really took off in the internet age. Before they began using advanced cryptography to target corporate networks, hackers were targeting general internet users with basic ransomware.
One of the most successful variants was 'police ransomware', which tried to extort victims by claiming the PC had been encrypted by law enforcement. It locked the screen with a ransom note warning the user they'd committed illegal online activity, which could get them sent to jail.
However, if the victim paid a fine, the 'police' would let the infringement slide and restore access to the computer by handing over the decryption key. Of course, this wasn't anything to do with law enforcement – it was criminals exploiting innocent people.
While somewhat successful, these forms of ransomware often simply overlaid their 'warning' message on the user's display – and rebooting the machine could get rid of the problem and restore access to files that were never really encrypted.
Criminals learned from this approach and now the majority of ransomware schemes use advanced cryptography to truly lock down an infected PC and the files on it.
What are the main types of ransomware?
Ransomware is always evolving, with new variants continually appearing and posing new threats to businesses. However, there are certain types of ransomware that have been much more successful than others.
The gang behind REvil spend a long time laying the groundwork for an attack, stealthily moving across the compromised network to ensure that everything possible can be encrypted before the ransomware attack is launched.
Those behind REvil have been known to demand payments of millions of dollars in exchange for decrypting the data. And given the hackers often gain full control of the network, those organisations that refuse to pay the ransom after falling victim to REvil also find themselves being threatened with so-called double-extortion attacks, with cyber criminals threatening to release stolen information if the ransom isn't paid – a tactic that has been copied by other ransomware gangs. Several suspected members of REvil were arrested in late 2021 and early 2022, leading to a decline in REvil operations.
While REvil and Conti have been some of the biggest ransomware threats of 2021 and 2022, new ransomware families are emerging all the time while others suddenly disappear or go out of fashion, with novel variations constantly emerging on underground forums. Any of the top forms of ransomware right now could be yesterday's news in just a few months.
For example, Locky was once the most notorious form of ransomware, creating havoc within organisations around the world throughout 2016, spreading via phishing emails. Locky remained successful because those behind it regularly updated the code to avoid detection and improve functionality.
The following year, it was Cerber that became the most dominant form of ransomware, accounting for 90% of ransomware attacks on Windows in April 2017. One of the reasons Cerber became so popular was the way it was distributed as 'ransomware-as-a-service', allowing users without technical know-how to conduct attacks in exchange for some of the profits going back to the original authors.
While Cerber seemed to disappear by the end of 2017, it pioneered the 'ransomware-as-a-service' model that is popular with many forms of ransomware today, allowing cyber criminals to effectively lease out their ransomware, with the would-be criminals giving the developers a cut of the profits.
Throughout 2018 and 2019, another family of ransomware that proved problematic for both businesses and home users was GandCrab, which Europol described as "one of the most aggressive forms of ransomware" at the time.
GandCrab operated 'as-a-service' and received regular updates, meaning that even when security researchers cracked it and were able to release a decryption key, a new version of the ransomware with a new method of encryption would appear soon after.
GandCrab disappeared a few weeks later, although it appears as if the attackers could have just switched their focus to another campaign; researchers have suggested strong similarities in the code of GandGrab when compared to REvil.
While ransomware operations come and go, the individuals involved with building and testing the malware regularly move between them or seek new opportunities, meaning there's a steady flow of new ransomware variants to potentially become the next big threat.
Fearing supply shortages due to the incident, the US Department of Transport's Federal Motor Carrier Safety Administration (FMCSA) issued an emergency declaration, so road transport of fuel could help meet demands of those not being serviced by the pipeline shut off by ransomware.
The attack was attributed to Darkside, a ransomware-as-a-service operation. Darkside was a relatively little-known operator in the ransomware space before the Colonial Pipeline incident, but the attack demonstrated that even if the ransomware isn't a high-profile 'brand' on underground forums, it can still cause massive disruption.
Darkside itself went dark not long after, but it's likely those involved transferred to other ransomware operations or developed new ransomware under a different name.
What was the Kaseya ransomware attack?
On Friday 2nd July Kaseya, an IT solutions developer for MSPs and enterprise clients announced it had fallen victim to a cyberattack – and it quickly became evident that the attackers has used a flaw to target some of its managed service providers and their customers.
In what's still regarded as one of the biggest ransomware attack to date, WannaCry – also known as WannaCrypt and Wcry – caused chaos across the globe in an attack that started on Friday 12 May 2017.
WannaCry ransomware demanded $300 in bitcoin for unlocking encrypted files – a price that doubled after three days. A ransom note threatened users that all their files would be permanently deleted if the ransom wasn't paid within a week.
Of all the countries affected by the attack, Russia was hit the hardest, according to security researchers, with the WannaCry malware crashing Russian banks, telephone operators, and even IT systems supporting transport infrastructure. China was also hit hard by the attack, with 29,000 organisations in total falling victim to this particularly vicious form of ransomware.
Other high-profile targets included the car manufacturer Renault, which was forced to halt production lines in several locations as the ransomware played havoc with systems.
This cyberattack first hit targets in Ukraine, including its central bank, main international airport, and even the Chernobyl nuclear facility, before quickly spreading around the globe, infecting organisations across Europe, Russia, the US, and Australia.
After some initial confusion as to what this malware was – some said it was Petya, some said it was something else, hence the name NotPetya – researchers at Bitdefender came to the conclusion that the outbreak was down to a modified version of Petya ransomware, combining elements of GoldenEye – a particularly vicious relative of Petya – and WannaCry ransomware into extremely potent malware.
The attackers asked for a bitcoin ransom of $300 to be sent to a specific email address, which was shut down by the email service host. However, the way this very sophisticated ransomware was apparently equipped with very basic, non-automated functions for accepting ransoms has led some to suggest that money wasn't the goal.
In February 2018, the governments of the United Kingdom, the United States, Australia and others officially declared that the NotPetya ransomware had been the work of the Russian military. Russia denies any involvement.
How much will a ransomware attack cost you?
Obviously, the most immediate cost associated with becoming infected with ransomware – if it's paid – is the ransom demand, which can depend on the type of ransomware or the size of your organisation.
Ransomware attacks can vary in size but it's becoming increasingly common for hacking gangs to demand millions of dollars to restore access to the network. And the reason hacking gangs are able to demand this much money is, put simply, because plenty of organisations will pay.
That's especially the case if a network being locked with ransomware means the organisation can't do business – it could lose large amounts of revenue for each day, perhaps even every hour, the network is unavailable. It can quickly add up to millions.
If an organisation chooses not to pay the ransom, not only will it lose revenue for a period of time that could last weeks, perhaps months, they'll also have to pay a large sum for a security company to come in and restore access to the network. In some cases, this might even cost more than the ransom demand, but at least the payment is going to a legitimate business rather than funding criminals.
To put it simply: ransomware could ruin your business. Being locked out of your own files by malware for even just a day will impact your revenue. But given that ransomware takes most victims offline for at least a week, or sometimes months, the losses can be significant. Systems go offline for so long, not just because ransomware locks the system, but because of all the effort required to clean up and restore networks.
And it isn't just the immediate financial hit of ransomware that will damage a business; consumers become wary of giving their data to organisations they believe to be insecure.
The education sector has also become a very common target for ransomware campaigns. Schools and universities became reliant on remote learning due to the coronavirus pandemic and cyber criminals noticed. The networks are used by potentially thousands of people, many using their personal devices, and all it might take for a malicious hacker to gain access to the network is a successful phishing email or cracking the password of one account.
Small and medium-sized businesses are a popular target because they tend to have poorer cybersecurity than large organisations. Despite that, many SMEs falsely believe they're too small to be targeted – but even a 'smaller' ransom of a few hundred dollars is still highly profitable for cyber criminals.
Smaller businesses can also make tempting targets because supply chain attacks can provide access to a larger, more lucrative target.
If organisations weren't giving in to ransom demands, criminals would stop using ransomware. But businesses need access to data in order to function, so many are willing to pay a ransom and get it over and done with.
Meanwhile, for criminals it's a very easy way to make money. Why spend time and effort developing complex code or generating fake credit cards from stolen bank details if ransomware can result in instant payments of millions of dollars?
Cyber insurance is a policy designed to help protect organisations from the fallout from cyberattacks.
What does bitcoin and other cryptocurrency have to do with the rise of ransomware?
The rise of crypocurrencies like bitcoin has made it easy for cyber criminals to secretly receive payments extorted with this type of malware, without the risk of the authorities being able to identify the perpetrators.
The secure, untraceable method of making payments – victims are asked to make a payment to a bitcoin address – makes it the perfect currency for criminals who want their financial activities to remain hidden.
Many cyber-criminal ransomware groups offer "customer service" to help victims who don't know how to acquire or send bitcoin to do so, because what's the point of making ransom demands if users don't know how to pay? Some organisations have even hoarded some of the cryptocurrency in case they get infected or their files are encrypted and have to pay bitcoin in a hurry.
When remote ports are necessary, organisations should make sure that the login credentials have a complex password to protect against criminals looking for a way in. Applying multi-factor authentication to these accounts can also act as a barrier to attacks, as there will be an alert if there's any attempt at unauthorised access.
There's also something to be said for enabling employees to learn from making mistakes while within a safe environment. For example, one firm has developed an interactive video experience that allows its employees to make decisions on a series of events and then find out the consequences of those choices at the end. This process enables them to learn from their mistakes without suffering any of the actual consequences.
On a technical level, stopping employees from being able to enable macros is a big step towards ensuring that they can't unwittingly run a ransomware file.
At the very least, employers should invest in antivirus software and keep it up to date, so that it can warn users about potentially malicious files. Backing up important files and making sure those files can't be compromised during an attack is also key because that makes it possible to recover the network without paying a ransom. But even if attacks are already inside the network, it isn't too late – if information security teams can spot unusual or suspicious activity before the ransomware attack is launched, it's possible to reduce the scope of the attack or prevent it altogether.
How long does it take to recover from a ransomware attack?
Simply put, ransomware can cripple a whole organisation – an encrypted network is more or less useless and not much can be done until systems are restored.
If your organisation is sensible and has backups in place, systems can be back online in the time it takes the network to be restored to functionality, although depending on the size of the company, that could range from a few hours to days.
However, while it's possible to regain functionality in the short term, it can be the case that organisations struggle to get all systems back up and running for months.
Outside of the immediate impact ransomware can have on a network, it can result in an ongoing financial hit. Any period of time offline is bad for a business as it ultimately means the organisation can't provide the service it sets out to, and can't make money. But the longer the system is offline, the bigger that hit can be.
That's if your customers want to do business with you: in some sectors, the fact you've fallen victim to a cyberattack could potentially drive customers away.
Another way of working around a ransomware infection is to ensure your organisation regularly backs up data offline. It might take some time to transfer the backup files onto a new machine, but if a computer is infected and you have backups, it's possible just to isolate that unit and then get on with your business. Just make sure that crypto-locking crooks aren't able to encrypt your backups, too.
But be warned: if word gets out that your organisation is an easy target for cyber criminals because it paid a ransom, you could find yourself the target of other cyber criminals who are looking to take advantage of your weak security. And remember that you're dealing with criminals here and their very nature means they may not keep their word: there's no guarantee you'll ever get the decryption key, even if they have it. Decryption isn't even always possible: there are stories of victims making ransom payments and still not having encrypted files unlocked.
As ransomware continues to evolve, it's crucial your employees understand the threat it poses, and for organisations to do everything possible to avoid infection, because ransomware can be crippling and decryption is not always an option.