Short on Time? Here’s what you need to know about ransomware in 2023:
Can antivirus really prevent ransomware? Yes, and no. An antivirus can prevent many types of ransomware, but it can’t stop it once it’s taken control of your system. However, antivirus programs are evolving to overcome the threat.
Ransomware works a lot differently than traditional viruses, attacking your important files by holding them hostage with encryption. The hackers try to extort money to set them free. These types of attacks are most commonly used against large businesses and individuals with valuable data, but anyone could potentially become a victim.
Hackers are interested in restricting your access to valuable data so education, government, energy and utilities, and healthcare continue to be the hardest hit industries. Some experts have described these attacks as the biggest current cybersecurity threat.
Yet, these attacks cost more than just money. They also lead to the loss of important data, costly downtime, and decreased productivity.
What Is Ransomware and Where Does It Come From?
In short, ransomware is a form of malware that holds your computer or your data for ransom. Threats of this type lock all or part of your computer down and will deny you access until you’ve paid the fee. Ransomware first appeared in the 1980s but didn’t pose a serious threat to the public until the last decade. Today, thousands of ransomware attacks occur every day.
Ransomware infects your computer like most viruses: opening an email attachment, downloading a suspicious file, or visiting a website that has already been infected. The only way to stop ransomware is to have an up-to-date antivirus.
However, the sophistication and evolution of ransomware viruses make them difficult to detect. With ransomware constantly changing, it’s difficult for some antivirus programs to pick them up until it’s too late.
How Does Ransomware Work?
Ransomware attacks tend to follow a general pattern:
- You Contract an Infection. Ransomware infections work similarly to other viruses. You may download it as a result of phishing, a social engineering tactic that tricks you into authorizing a download that you think is a safe or legitimate program. Alternatively, it could take the form of an exploit kit, which targets vulnerabilities in your existing software to gain backdoor access.
- The Wait Period. Not all ransomware acts immediately. Some take up to 15 minutes to take hold, although others do manage to cause havoc in seconds.
- Encryption. Your data and files will be encrypted, requiring a decryption key to access them. The specific version of ransomware determines the level of encryption. A 16-bit and 32-bit encryption can easily be disabled using ransomware decryption tools. However, a 128-bit or 256-bit encryption is so strong it parallels browser and VPN security, making it nearly impossible to reverse.
- Financial Demand. The final stage is a pop-up message on your screen, alerting you to the infection. It will demand a ransom, which usually falls around $300-500. Hackers only ask individuals for amounts they may have on hand to increase the chances of them paying the fee, although businesses can pay tens of thousands of dollars.
It’s also common for ransomware to mimic local authorities. The message may claim that you’ve acted illegally or accessed banned content, and that’s why you are being fined. They often use county police or government logos to increase the authenticity.
Ransom payments are usually demanded in cryptocurrencies such as Bitcoin, which makes it more difficult to track.
Types of Ransomware
Ransomware is a general label for a group of different malware types. They all have the common feature of demanding a ransom payment for removal but they don’t all behave the same way.
The following are some of the most common types:
- Locker ransomware is considered to be the first type ever discovered. As its name suggests, it locks users out of their computers and demands some form of payment. This is one of the most debilitating versions as it often requires a system wipe to remove. Unfortunately, paying the ransom doesn’t always save you; some hackers have embedded password-stealing software even once the ransom has been paid.
- Crypto ransomware’s key difference is that payment is demanded in the form of a cryptocurrency. Hackers often lock the user’s files and demand payment through an anonymous cryptocurrency address.
- Mac ransomware is a form of ransomware for Mac computers. The first known case of it, referred to as KeRanger, appeared in 2016. This version would wait three days before encrypting 300 files. At that point, it would create a text file demanding a single Bitcoin.
- Leakware works by stealing your information and threatening to release the data if you don’t pay up. Targeted details could include your bank info, contacts, intimate photos, and personal documents. It’s an especially successful tactic as it causes the victim to panic and respond rashly.
- Scareware usually poses as fake security software. Once downloaded, it will alert you of issues that cost extra money to fix. In some cases, you will be flooded with so many alerts and pop-ups that your computer is unusable until you take action.
- RaaS stands for Ransomware as a Service, a meta-malware type employed by career criminals. A hacker will hire out their services creating and distributing ransomware in exchange for a cut of the fine. This kind is particularly dangerous as it can be used by anyone wanting revenge, and could target you specifically.
Over the years, countless instances of each type of ransomware have been detected. However, some attacks have done more damage than others.
Famous Examples of Ransomware
WannaCry, one of the most destructive cyberthreats in history, downed over 250,000 computers in 116 countries. The ransomware’s victims weren’t just personal devices; entire businesses and systems were brought to a standstill — including the British National Health Service.
In the UK, patients couldn’t make appointments, doctors couldn’t access records, and lives were put at risk. Suddenly, the cyberwarfare we see in movies such as Firewall (2006) or Goodbye World (2013) was no longer just a plot device. The threat had become a reality.
Seventy-five percent of the victims had to pay to get their data back, and ransomware increased by 350% around the world in just one year.
This attack was not the first instance of ransomware, but it was one of the most destructive. Here are some other famous examples of ransomware over the last couple of years:
- CryptoLocker used a Trojan to target Windows computers. It affected 250,000 devices, mostly targeting users in the UK and US. The infection was spread using password-protected .zip files, which claimed to contain an important PDF.
- TeslaCrypt was a ransomware trojan that is now, fortunately, defunct. It targeted game-players via file extensions for popular games, such as Call of Duty, WoW, and Minecraft. Once infected, the malware demanded $500 in ransom payments from the victims.
- SimpleLocker is a type of mobile malware that mimics CryptoLocker. It blackmails victims by accusing them of committing a crime and demanding a fine. The pop-up fills the entire screen and returns even if you turn the device on and off.
- NotPetya was a reinvention of the Petya ransomware of 2016. Potentially inspired by WannaCry, just a few weeks later NotPetya was released. It demanded $300, and 90% of the attacks were on Ukrainian victims, leading some to suggest it was organized by Russia.
- Locky existed before the recent rise in ransomware. It affected half a million users and demanded a payment of one Bitcoin, which at the time was worth nearly $1,000. The malware was spread via an infected Word document, using social engineering tactics.
- Cerber is another earlier form of ransomware that existed in 2016. It attacked 150,000 Windows users in July alone and continues to cost around $2.3 million a year.
Although these types of ransomware are some of the most prolific, countless forms currently exist. Fortunately, you can protect yourself.
Tips to Prevent Ransomware
Simply knowing about ransomware isn’t enough to keep you safe. Your best weapon is understanding how to protect yourself. Due to its destructive nature, recovering from ransomware is a unique challenge, so it’s better to learn how to pre-empt an attack and avoid the infection altogether.
Here’s how to do it:
- Perform Regular Backups. While it’s relatively simple to remove a ransomware infection, getting back your encrypted files without paying the ransom is more challenging. If it’s impossible to restore your data, the best tactic is to perform regular backups of your system. Then, if you are attacked, you can simply restore to a time before you’d contracted malware.
- Update Software Regularly. Ransomware commonly exploits security holes to gain access to your device. The best way to avoid this issue is to update everything regularly. Software producers release new versions with patches for known vulnerabilities, so staying up-to-date will increase your security drastically.
- Click Smart. Phishing scams are another common form of ransomware distribution. Avoiding social engineering isn’t impossible, as long as you know the signs. Be on the lookout for fake URLs, unexplained email attachments, and pop-ups. Never click banner ads or other “deals,” and look for typos and unrealistic claims to avoid fraudulent emails.
- Stick to Trusted Sources. Perhaps the best tactic to avoid accidentally downloading a ransomware trojan is to stick only to sources you trust. This refers to everything online: websites, software, emails, e-commerce sites, etc. Most domains and brands are highly reviewed, so it’s easy to stick to those with a good reputation.
- Try Whitelisting Software. By creating a baseline of approved applications, whitelisting software will prevent any unknown programs from launching and running on your device. If you unwittingly download malware, the whitelisting app will compare it to its list of sanctioned programs and will block any actions that don’t match.
- Use a Top-Quality Antivirus. Good antivirus suites are essential for combating ransomware. They will alert users as soon as they locate a problem, and can also remove the infection easily. The best antivirus companies keep a catalog of all the known threats, so they can identify ransomware quickly and effectively. Some antivirus apps also provide a free ransomware decryption tool for malware with low-level encryption. Some may feel it’s too time-consuming or expensive to invest in their computer security. However, facing a ransomware attack will be far more costly than any prevention strategy.
How Antivirus Detects Ransomware
Known forms of ransomware are often easy for your antivirus to detect. Why? It’s all based on how ransomware behaves. Typically, your antivirus will notify you when something is trying to encrypt files out of nowhere.
Your antivirus works by constantly asking you which programs are safe, telling you about suspicious ones, and learning from the orders you give it. When a file becomes encrypted, or if subtle, uncommon changes are made to a file, your antivirus will let you know. Because of this, known ransomware is fairly easy to detect.
However, when it comes to 2nd generation ransomware, it’s a bit more difficult. Hackers are starting to employ methods that are difficult for antivirus programs to pick up.
Here’s what Cisco had to say about it:
“Many ransomware operations also have development teams that monitor updates from antivirus providers so that the authors know when a variant has been detected and it’s time to change techniques. Adversaries rely on the cryptocurrency bitcoin for payments, so transactions are more difficult for law enforcement to trace. And to maintain a good reputation in the marketplace—that is, being known to fulfill their promise to give users access to their encrypted files after the payment has been processed—many ransomware operators have established elaborate customer support operations.”
The average computer user doesn’t have the resources to take on challenges like this. They rely on their antivirus to protect them, but what should they do when even that isn’t enough?
Stopping Ransomware Before It Infects
Being proactive is still the best defense against ransomware. New updates try to combat the known versions of ransomware. And while we can’t predict what the future holds, you can protect yourself by exhibiting safe browsing practices.
Still, that doesn’t mean you shouldn’t install an antivirus.
Some popular options include:
Many of these programs are capable of detecting known ransomware. It’s important that you take the right steps to reduce your chances of getting infected.
Remember, it’s easier to stop something before it starts. Once ransomware takes over your computer, removing it can be really difficult and result in data loss.
What To Do If Your Computer Gets Infected By Ransomware
Ransomware is notoriously difficult to deal with once it’s taken a hold of your files. If you do get infected, there’s more than a slim chance you won’t get your data back without paying the ransom.
Most experts, however, advise against paying the ransom. Here’s why:
- First, paying the ransom encourages the criminals to continue their scam
- Second, there’s no guarantee paying the ransom will get you your files back
However, if your data is extraordinarily important or sensitive, it’s completely up to you. There are plenty of documented cases of victims paying the ransom and receiving their data back in one piece.
That said, there are a few other techniques you can try before you give in to the attackers or give up on your data:
- Disconnect from the network. In the event of a ransomware alert, it’s crucial to disconnect from the network immediately to prevent it from spreading or accessing files on other devices in the network.
- Remove the Ransomware. Scouring your computer and encrypting your files takes time, so you’ll want to remove the ransomware as soon as possible to minimize the damage. If you have a powerful antivirus on your computer, this should be easy. If not, you can always try one of the best free options for a quick fix. Removing the malware, however, won’t release your files.
- Look for a Decryption Key Online. Luckily, there’s a huge community of whitehat hackers and cyber security experts working diligently to crack the latest ransomware strains. Use a tool like Crypto Sheriff to determine what strain has infected your computer, and scour resources like No More Ransom to see if a decryption key has been created yet. If you’ve been attacked by a common ransomware strain, there’s a decent chance someone will have cracked it and you may be able to recover your files.
- Call a Professional (and Law Enforcement). If you’re still not able to recover your files or system access and you desperately need them back, you might want to call in a professional. Try your local computer repair shops or the Geek Squad — often they have antivirus or ransomware services, and they may be able to help. You should also report the ransomware attack to the local police or the FBI, which tracks cyber-attacks through its Internet Crime Complaint Center.
The Best Defense Against Ransomware Is You
Like any virus, you have to make a mistake for ransomware to infect your machine. So instead of clicking every link you see, you need to:
- Think about the links you are clicking
- Make sure you only browse safe websites
- Keep your antivirus up to date
- Change your antivirus if it doesn’t have ransomware protection
- Back your files up using an external hard drive or in the cloud
Your antivirus will be able to protect you from basic, known forms of ransomware. With the rise in popularity of ransomware attacks, antivirus companies are working hard to increase detection and protection. But they have a long way to go before we can declare ransomware a thing of the past.
If you want to improve your security, practice safe browsing habits and take the necessary steps to keep your data safe and backed up.