Uncovering Aggressive Methods Used by Ransomware Operators to Disrupt Reputation of Victims

The first instance of ransomware was observed in December 1989.
Tracked as AIDS trojan, the ransomware was introduced to the world after it infected 20,000 floppy disks.

Ransomware has been one of the most prolific cyber threats in recent years and it is unlikely that the menace due to this malware will stop any time soon.

The first ransomware attack


The first instance of ransomware was observed in December 1989. Tracked as AIDS trojan, the ransomware was introduced to the world after it infected 20,000 floppy disks of delegates who had attended the World Health Organization’s AIDS conference in Stockholm.

The disk contained malicious code that hid file directories, locked file names and demanded victims a ransom of $189 to be sent to a PO Box in Panama.

Enhanced with more destructive nature


Almost two decades later, ransomware emerged to be much more powerful. In 2006, the malware assumed the name Archiveus and carried out sophisticated attacks on PCs across the globe. Archiveus encrypted all files in the ‘My Documents’ folder and instructed victims to make purchases on specific websites if they wanted to receive the decryption password.

The arrival of Bitcoin in 2008 added more fuel to a string of attacks under ransomware. The monikers including GPcode, Krotten, Cryzip, and many others changed the attack process of ransomware to extort people and generate revenue.

By 2016, ransomware-as-a-service had become common, enabling many organized cybercriminals to target businesses and public sector organizations.

Operators become more proactive


In today’s world, there are many decryption keys for several notorious ransomware. Also, with the recent ‘No More Ransom project’, organizations have started backing off from paying the ransom to ransomware authors. This has led the ransomware operators to devise a new ‘Naming- ..

Support the originator by clicking the read the rest link below.