The traits all true systems administrators share, though, are the unwavering dedication to making the Internet better, and mastery of all things infrastructure.
Ransomware is as old as the internet itself—it has been causing havoc across computer networks worldwide for decades. Much like virus variants, it has adapted along the way and has a fascinating history.
Most recently, it has made the news for disabling everything from oil pipelines, governments and big businesses. In the most egregious use during the COVID pandemic, hospital networks have been targeted with Ransomware, encrypting essential patient data and operational systems that patients’ lives depended on. In 2020 alone, over 600 medical institutions were impacted by 92 total attacks. Attackers demanded millions of dollars for the safe decryption of this critical information. It is hard to say how many lives were affected or lost.
How Ransomware began
So when did this all begin? Surprisingly, with floppy disks way back in the late 80s. In 1989, a virus called the AIDS Trojan, or Cyborg Virus, disabled systems and requested that users send nearly $200 to an address in Panama to restore access. This small-scope attack tested the waters for what would develop into a multimillion-dollar ransomware sub-industry.
A critical factor in the history and development of Ransomware has been the expansion of anonymous payment systems. While other computer viruses might profit from selling stolen information or manipulating data to shift geopolitics and exchange markets, Ransomware relies on obtaining direct ransom payments. In the early days of Ransomware, it was easier to collect payment via international PO boxes and other physical means, as these were less easily traced. However, this particular flavor of virus went relatively dormant in the early 2000s as payment methods became easier to trace.
But the lull didn’t last
There are prominent examples of ransomware attacks dating between 2005 and 2006, such as Gpcode, TROJ.RANSOM.A, Archiveus, Krotten, Cryzip, and MayArchive. They were precursors to more advanced Ransomware that would culminate in the 2010s. By then, programming could take advantage of early cryptography to lock data with public encryption keys that are proven mathematically infeasible to break, even with powerful computing hardware and concerted effort across multiple networks.
The year 2010 also marked a breakthrough in the diversification of Ransomware. Russian programmers released viruses that displayed pornographic images on users’ screens that could not be removed until a ransom was paid. They asked for $10 per user, netting a total bounty of $16 million across Russia and neighboring countries.
In 2013, the FBI MoneyPak ransomware virus used false identity to claim the attackers belonged to the FBI and had recognized illegal activity on users’ computers. Users were more likely to comply with payment, believing it to be a legal fee much like a parking ticket to evade further fines.
Fast forward to 2019—hackers have found ways to infect mobile devices, with one fringe example proving it possible to insert Ransomware onto a DSLR camera, locking it beyond functionality, and displaying a ransom message akin to those found on desktop computers. In 2021, all devices connected to the internet are susceptible to Ransomware in some form.
Why Ransomware is so lethal to computers today
Ransomware invades individual systems and entire servers, commonly through trojans. A layperson might think they are protected from trojans because they have anti-malware or antivirus software installed—it is not as simple as that. Attackers are aware of these primary and are already steps ahead. You will not ever know you have been affected by a trojan until it is too late.
Once executed, they sink their fangs into root-level files to start an irreversible encrypting of the drive. Encryption happens behind the scenes and goes undetected. Then, once complete, the malicious program turns the key, locking the system down. It sends the encryption key to the attacker at their home base, which could be anywhere in the world. This is where the user becomes aware they have been hacked.
A message will take over the screen, demanding that a ransom be sent via an untraceable method such as a cryptocurrency transaction. It might have a deadline that threatens to publish or erase the encrypted information should the money not be sent. By then, it is too late to do anything but pay the attacker, as modern encryption would take magnitudes of millions of years to brute force open.
Because ransomware attacks are time-sensitive and irreversible, the only way to stay protected is to be proactive. A reactive approach using Antivirus apps is ultimately futile against Ransomware which has already taken hold of a system. Similarly, firewalls that are one-size-fits-all are no good at protecting against the complexity of today’s attacks.
How to protect your server
Web application firewalls (WAFs), like MojoShield, run in front of web hosting to filter out everything unsavory. They do not trust traffic unless given express permission by site admins. WAFs can also be customized with rules and access hierarchies to fit individual needs for maximum security.
The US Cybersecurity & Infrastructure Security Agency has an entire government website dedicated to educating citizens of the internet on just how dire these threats are. The US Treasury has released a statement detailing potential issues with companies who engage in ransomware payouts. They state:
Companies that facilitate ransomware payments to cyber actors on behalf of victims, including financial institutions, cyber insurance firms, and companies involved in digital forensics and incident response, not only encourage future ransomware payment demands but also may risk violating OFAC regulations.
Attack tactics are changing as defensive technology adapts to each new threat. Nevertheless, computers are not like humans. When faced with a virus, people can quarantine away and stay disconnected from other humans until the situation resolves. The purpose of today’s computers is primarily to communicate with other computers, so as long as they are sending and receiving data in any way, they may be faced with an infection.
The more system admins take a proactive stance on this age-old threat, the less advantage attackers will have in holding essential information hostage and #ThatsGoodMojo.