(770) 424-3393 Facebook logo Twitter logo Linkedin logo YouTube 001 gplus RSS feed

Carceron Blog

Carceron has been serving the Atlanta area since 2002, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Did You Know Early Ransomware Spread via Floppy Disk?

Did You Know Early Ransomware Spread via Floppy Disk?

Ransomware might be a relatively new player in the battle for the Internet, but its short history shouldn’t belittle the damage that it can do to both businesses and users of personal computers. Perhaps you’ve had the misfortune to encounter it for yourself, and your files were locked down because of it. Regardless, ransomware is now a prevalent part of the online crime scene, and people are using it to extort money from innocent users, making it a considerable threat.

Initial Development
Ransomware might be used with malicious intent, but it wasn’t always meant to be used this way. In 1986, two Pakistani brothers, Basit and Amjad Alvi, built a piece of software that instructed users to call a phone number if they encountered a warning message. The goal was to use this program to identify piracy and protect the brothers’ assets, but with anything even remotely useful and helpful to society, someone out there managed to find a way to turn it against the masses and make a profit off of it.

Early Ransomware
The code created by the Alvi brothers was soon modified to lock down files, creating what’s known today as the PC Cyborg/AIDS virus, which was delivered on a floppy disk labeled “AIDS Information Introductory Diskette.” When it’s installed on the system, it restricts and hides files on the computer’s hard drive. The threat would then demand that the user pay $189 to a P.O. box in Panama in order to “renew their software license.”

The Return of Ransomware
Nearly two decades later, ransomware returned with a vengeance. In 2006, a trojan horse called GPCoder (also known as PGPCoder) was developed to encrypt files with common extensions (.doc, .html, .jpg, .xls, .zip, .rar, etc). They then extorted money out of the user by dropping a simple text file into each folder stating that the user had to pay in order to receive instructions on how to decrypt the files.

At around the same time, the software started to evolve and create new strains that would resemble the sophisticated attacks we see today. The type of encryption grew more powerful, which made it easier for hackers to use without placing themselves at much risk. The result is natural: more frequent ransomware attacks, which led to easy profits for hackers.

Contemporary Ransomware
In 2013, the world saw the debut of what’s considered the beginning of a contemporary ransomware takeover: CryptoLocker. CryptoLocker is delivered through infected email attachments that appear to come from legitimate sources. The ransomware itself is embedded in the email in the form of a .zip file that may be disguised as a .pdf file. Once the user unpackages the files, the ransomware is installed and adds a security key to the user’s registry. This allows the hacker to hijack the user profile and lock down the files on the system.

There are several known variants of CryptoLocker, many of which work the same way and produce the same results. One in particular, CryptoWall, is known to spread across infrastructures and infect multiple endpoints, making it exceptionally dangerous. Despite security companies’ best efforts to protect against ransomware, it has grown very popular and difficult to control once it’s been installed on a user’s PC.

In terms of your organization’s IT, there are several ways that you can protect your business’s assets. One of the best ways you can do so is by implementing a spam-blocking solution that keeps threatening messages out of your inbox in the first place. Additionally, it’s important to mitigate your losses in the event of a ransomware infection by keeping your data backed up and stored off-site--you know, just in case. If you get infected with ransomware, this is often the only way to recover your data without paying the fine.

To learn more about ransomware and what Carceron can do to keep your business safe, reach out to us at (770) 424-3393.

Comments

 
No comments yet
Already Registered? Login Here
Guest
Friday, 30 September 2016
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Security Technology Best Practices Privacy Internet Tip of the Week Microsoft Business Management Managed Service Provider Software Workplace Tips Cloud Backup Saving Money Hardware Data Small Business Productivity Gadgets Hackers Mobile Office Business Computing Business Email Hosted Solutions IT Services Quick Tips Malware Google Social Media IT Support Virtualization Upgrade Mobile Devices Business Continuity Passwords Users Smartphones Disaster Recovery Microsoft Office Network Windows Server WiFi VoIP Miscellaneous Innovation Computer User Tips Windows 10 Efficiency Mobile Computing Communication Mobile Device Management Vendor Management Operating System Smartphone Unified Threat Management Remote Computing Marketing BYOD Apps The Internet of Things Holiday Analytics History Health IT Consultant Android Facebook Wireless Technology Windows 8 Apple Bring Your Own Device Ransomware Alert Going Green Tech Support Hard Drives Lithium-ion Battery Outlook Network Security Office Big data Printer Content Filtering Information Technology Saving Time Hiring/Firing Firewall Data Management Collaboration Save Money Remote Monitoring Phishing Employer-Employee Relationship Spam Gmail Tutorials Proactive IT Computers Save Time Search Best Practice Automation Bandwidth Antivirus Humor Smart Phones Browser Computer Repair Maintenance Excel Phone System App Managed IT services Education Current Events Budget Mobile Device Fax Server Money Two-factor Authentication Wireless PowerPoint User Error Help Desk Running Cable Internet of Things Sports Avoiding Downtime Hacking Router Intranet User Business Intelligence Administration iPhone Document Management Recovery Cybercrime Password Programming Thin Client Legal Data storage Statistics Streaming Media Cortana Net Neutrality Presentation Risk Management Flexibility Processors Office Tips communications Computing Documents Customer Relationship Management Social Networking Digital Payment Retail Bluetooth Hosted Solution Laptop Computer Accessories Comparison Augmented Reality Website SaaS Inbound Marketing Virtual Desktop Network Congestion Text Messaging Experience Black Market VPN Comanaged IT Heating/Cooling Compliance Virus Business Growth Encryption Pain Points Printer Server Chrome Networking Safety Company Culture Gaming Console Social Cost Management IBM End of Support Artificial Intelligence Customer Service Downtime Government USB Point of Sale Tablet Writing Outsourced IT Unified Communications Debate GPS Download Word Staffing HIPAA Skype Microserver Public Speaking switches Permissions Electronic Payment Lifestyle 3D Paperless Office Leadership Microchip Google Docs Entrepreneur Disaster Teamwork Turn Key Regulations Hacker Solid State Drive Identity Theft Securty BDR Best Available Storage File Sharing IP Address IT consulting Human Resources Society Touchscreen Read Virtual Reality Micrsooft Keyboard Value Harddrive Adminstration IT service Windows XP PDF Computing Infrastructure Robot Shortcut CIO LinkedIn Adroid Troubleshooting Wearable Technology Memory Wi-Fi Music Mouse Operating Systerm Upgrades Domains Business Owner Flash Telephone Systems eWaste Co-Managed IT Deep Learning LiFi Specifications Display Ebay Settings Banking Environment Efeciency External Harddrive Monitors Competition Office 365 Visible Light Communication Entertainment Content Management Analytic Pirating Information Language Business Metrics Google Wallet Riske Management Recycling Digital Signature organize Displays Application Advertising Archive Managed IT Webinar Chromebook Drones Update YouTube DDoS Video Surveillance Work/Life Balance Twitter Law Enforcement Online currency Trending

Mobile? Grab this Article!

QR-Code

Recent Comments

No comments yet.

Blog Archive