opinion

A Brief History of Virus Profiteers

A Brief History of Virus Profiteers

Ransomware is as old as the internet itself. It has been causing havoc across computer networks worldwide for decades. Much like virus variants, it has adapted along the way and has a fascinating history.

In recent years, ransomware has made the news for disabling everything from oil pipelines to governments and big businesses. In the most egregious case, during the COVID pandemic, hospital networks were targeted by ransomware, encrypting essential patient data and operational systems that lives depended on. Last year alone, over 600 medical institutions were impacted by 92 total attacks, with attackers demanding millions of dollars for the safe decryption of this critical information. It is hard to say just how many individuals were harmed by these disruptions.

The purpose of today’s computers is primarily to communicate with other computers; so as long as they are sending and receiving data in any way, they may be faced with an infection.

Looking back, when did ransomware truly begin? Surprisingly, it originated with floppy disks in the late ’80s. In 1989, a virus called the AIDS Trojan, or Cyborg Virus, disabled systems and demanded that users send nearly $200 to an address in Panama to restore access. This small-scope attack tested the waters for what would develop into a multimillion-dollar ransomware sub-industry.

A critical factor in the history and development of ransomware has been the expansion of anonymous payment systems. While other computer viruses might profit from selling stolen information or manipulating data to shift geopolitics and exchange markets, ransomware relies on obtaining direct ransom payments. In the early days of ransomware, it was easier to collect payment via international PO boxes and other physical means, as these were less easily traced. However, this particular flavor of virus went relatively dormant in the early 2000s as physical payment methods became easier to trace.

There are prominent examples of ransomware attacks dating between 2005 and 2006, such as Gpcode, TROJ.RANSOM.A, Archiveus, Krotten, Cryzip and MayArchive. They were precursors to more advanced ransomware that would appear in the 2010s. By then, programming could take advantage of early cryptography to lock data with public encryption keys that are proven mathematically infeasible to break, even with powerful computing hardware and concerted effort across multiple networks.

The year 2010 also marked a breakthrough in the diversification of ransomware. Russian programmers released viruses that displayed pornographic images on users’ screens that could not be removed until a ransom was paid. They asked for $10 per user, netting a total bounty of $16 million across Russia and neighboring countries.

In 2013, the FBI MoneyPak ransomware virus used false identity to claim the attackers belonged to the FBI and had recognized illegal activity on users’ computers. Users were more likely to comply with payment, believing it to be a legal fee to evade further fines, much like a parking ticket.

Fast forward to 2019 and hackers have found ways to infect mobile devices, with one fringe example proving it’s possible to insert ransomware onto a DSLR camera, locking it beyond functionality, and displaying a ransom message akin to those found on desktop computers. In 2021, all devices connected to the internet are susceptible to ransomware in some form.

WHY RANSOMWARE IS SO LETHAL TO COMPUTERS TODAY

Ransomware invades individual systems and entire servers, commonly through trojans. A layperson might think they are protected from trojans because they have anti-malware or antivirus software installed — but it is not as simple as that. Attackers are aware of these primary defenses and are already steps ahead. You will not even know you have been affected by a trojan until it is too late.

Once executed, they sink their fangs into root-level files to start an irreversible encrypting of the drive. Encryption happens behind the scenes and goes undetected. Then, once complete, the malicious program turns the key, locking the system down. It sends the encryption key to the attacker at their home base, which could be anywhere in the world. This is when the user becomes aware they have been hacked.

A message will take over the screen, demanding that a ransom be sent via an untraceable method such as a cryptocurrency transaction. It might have a deadline that threatens to publish or erase the encrypted information should the money not be sent. By then, it is too late to do anything but pay the attacker, as modern encryption would take magnitudes of millions of years to brute-force open.

Because ransomware attacks are time-sensitive and irreversible, the only way to stay protected is to be proactive. A reactive approach using antivirus apps is ultimately futile against ransomware that has already taken hold of a system. Similarly, firewalls that are one-size-fits-all are no good at protecting against the complexity of today’s attacks.

Web application firewalls run in front of web hosting to filter out everything unsavory. They do not trust traffic unless given express permission by site admins. WAFs can also have customized rules and access hierarchies to fit individual needs for maximum security.

The U.S. Cybersecurity & Infrastructure Security Agency has an entire government website dedicated to educating citizens of the internet on just how dire these threats are. The U.S. Treasury released the following statement on October 21, 2020 detailing potential issues with companies who engage in ransomware payouts:

“Companies that facilitate ransomware payments to cyber actors on behalf of victims, including financial institutions, cyber insurance firms and companies involved in digital forensics and incident response, not only encourage future ransomware payment demands but also may risk violating OFAC regulations.”

Attack tactics are changing as defensive technology adapts to each new threat. Nevertheless, computers are not like humans. When faced with a virus, people can quarantine away and stay disconnected from other humans until the situation resolves. The purpose of today’s computers is primarily to communicate with other computers; so as long as they are sending and receiving data in any way, they may be faced with an infection.

The more system admins take a proactive stance on this age-old threat, the less advantage attackers will have in holding essential information hostage.

Brad Mitchell is the famed founder of MojoHost, which has won numerous XBIZ Awards for Web Host of the Year and earned many loyal clients for nearly two decades. Known for his dapper style and charismatic wit, Mitchell is a regular fixture at trade shows, where he frequently shares hard-won wisdom while striking profitable deals. Be sure to back up your data on MojoCloud in case of ransomware, or deploy MojoShield to stay safe. Contact brad@mojohost.com to learn more about the suite of services on tap.

Copyright © 2023 Adnet Media. All Rights Reserved. XBIZ is a trademark of Adnet Media.
Reproduction in whole or in part in any form or medium without express written permission is prohibited.

More Articles

profile

WIA: Sana Gaziani

Sana Gaziani has always been industrious. She worked in retail for over 20 years, first as a teenager selling chocolates door-to-door and then in multiple part-time jobs at grocery stores. She worked at cosmetics company Lush to put herself through college, where she studied to become a law clerk.

Women In Adult ·
opinion

Ensuring Subscription Billing Is a Win-Win for Businesses, Customers

Subscription billing is one of the fundamental cornerstones of our industry. Marketing practices and processing technologies have evolved, but the basic concept has remained unchanged.

Jonathan Corona ·
opinion

The Importance of a Modern Tech Stack

You’ve built your website or platform. It is a fantastic piece of software, it works — and even better, your customers love it. You’re done developing, so now you can fire all your developers and not renew your contractor agreements. Right?

Brad Mitchell ·
opinion

Unpacking Mastercard's Enhanced Communication Path

Sharing information is important between card associations and service providers like payment facilitators and independent payment operators. In those relationships, information typically flows from the card brands to the acquirers, and then to service providers.

Cathy Beardsley ·
trends

Piracy Battlefront: Content Protection Watchdogs on Evolving Threats, Solutions

Thanks to the creator economy, the rise of indie paysites and a cross-pollinating ecosystem of affiliates, studios and multibrand behemoths flooding the internet with billions of photos, videos and text messages, there has never been such a treasure trove of adult content online. But where there is treasure, there are pirates.

Alejandro Freixes ·
opinion

A Steady Pace & Realistic Goals Are Vital for Empire Building

I’ve seen countless websites and businesses fail to launch because the project exceeded the budget for development, and nothing was left for marketing or building a team. The dreaded cash crash.

Juicy Jay ·
opinion

Unveiling the Future With Mastercard's New AI Rules

As technology advances at an unprecedented pace, the role of artificial intelligence (AI) in driving innovation across industries has become crucial. The financial services sector, in particular, has recognized the potential of AI to improve efficiency, accuracy and customer experience.

Jonathan Corona ·
opinion

Eyes on the Site: Strategies for 24/7 Website Monitoring

Back in the 1990s, there were all sorts of companies that would scan your website and let you know if and when it ever went down. Ah, the memories. Site monitoring has since advanced far beyond those humble beginnings. Today, most websites are more complex, and checking whether one is online or not is not as simple as it used to be.

Brad Mitchell ·
opinion

Understanding Visa's New Pricing and High-Risk Tiers

In April, Visa announced that it was rebranding its Global Brand Protection Program as the Visa Integrity Risk Program (VIRP). The program is designed to strengthen the integrity and security of the Visa payment system.

Cathy Beardsley ·
profile

WIA Profile: Caroline Karolinko

When Caroline Karolinko joined Segpay in 2018, she did not know a lot about the adult industry. After graduating from the University of Florida with a master’s degree in speech-language pathology, she worked with autistic youth and others with behavioral disorders.

Women In Adult ·
Show More