opinion

A Brief History of Virus Profiteers

A Brief History of Virus Profiteers

Ransomware is as old as the internet itself. It has been causing havoc across computer networks worldwide for decades. Much like virus variants, it has adapted along the way and has a fascinating history.

In recent years, ransomware has made the news for disabling everything from oil pipelines to governments and big businesses. In the most egregious case, during the COVID pandemic, hospital networks were targeted by ransomware, encrypting essential patient data and operational systems that lives depended on. Last year alone, over 600 medical institutions were impacted by 92 total attacks, with attackers demanding millions of dollars for the safe decryption of this critical information. It is hard to say just how many individuals were harmed by these disruptions.

The purpose of today’s computers is primarily to communicate with other computers; so as long as they are sending and receiving data in any way, they may be faced with an infection.

Looking back, when did ransomware truly begin? Surprisingly, it originated with floppy disks in the late ’80s. In 1989, a virus called the AIDS Trojan, or Cyborg Virus, disabled systems and demanded that users send nearly $200 to an address in Panama to restore access. This small-scope attack tested the waters for what would develop into a multimillion-dollar ransomware sub-industry.

A critical factor in the history and development of ransomware has been the expansion of anonymous payment systems. While other computer viruses might profit from selling stolen information or manipulating data to shift geopolitics and exchange markets, ransomware relies on obtaining direct ransom payments. In the early days of ransomware, it was easier to collect payment via international PO boxes and other physical means, as these were less easily traced. However, this particular flavor of virus went relatively dormant in the early 2000s as physical payment methods became easier to trace.

There are prominent examples of ransomware attacks dating between 2005 and 2006, such as Gpcode, TROJ.RANSOM.A, Archiveus, Krotten, Cryzip and MayArchive. They were precursors to more advanced ransomware that would appear in the 2010s. By then, programming could take advantage of early cryptography to lock data with public encryption keys that are proven mathematically infeasible to break, even with powerful computing hardware and concerted effort across multiple networks.

The year 2010 also marked a breakthrough in the diversification of ransomware. Russian programmers released viruses that displayed pornographic images on users’ screens that could not be removed until a ransom was paid. They asked for $10 per user, netting a total bounty of $16 million across Russia and neighboring countries.

In 2013, the FBI MoneyPak ransomware virus used false identity to claim the attackers belonged to the FBI and had recognized illegal activity on users’ computers. Users were more likely to comply with payment, believing it to be a legal fee to evade further fines, much like a parking ticket.

Fast forward to 2019 and hackers have found ways to infect mobile devices, with one fringe example proving it’s possible to insert ransomware onto a DSLR camera, locking it beyond functionality, and displaying a ransom message akin to those found on desktop computers. In 2021, all devices connected to the internet are susceptible to ransomware in some form.

WHY RANSOMWARE IS SO LETHAL TO COMPUTERS TODAY

Ransomware invades individual systems and entire servers, commonly through trojans. A layperson might think they are protected from trojans because they have anti-malware or antivirus software installed — but it is not as simple as that. Attackers are aware of these primary defenses and are already steps ahead. You will not even know you have been affected by a trojan until it is too late.

Once executed, they sink their fangs into root-level files to start an irreversible encrypting of the drive. Encryption happens behind the scenes and goes undetected. Then, once complete, the malicious program turns the key, locking the system down. It sends the encryption key to the attacker at their home base, which could be anywhere in the world. This is when the user becomes aware they have been hacked.

A message will take over the screen, demanding that a ransom be sent via an untraceable method such as a cryptocurrency transaction. It might have a deadline that threatens to publish or erase the encrypted information should the money not be sent. By then, it is too late to do anything but pay the attacker, as modern encryption would take magnitudes of millions of years to brute-force open.

Because ransomware attacks are time-sensitive and irreversible, the only way to stay protected is to be proactive. A reactive approach using antivirus apps is ultimately futile against ransomware that has already taken hold of a system. Similarly, firewalls that are one-size-fits-all are no good at protecting against the complexity of today’s attacks.

Web application firewalls run in front of web hosting to filter out everything unsavory. They do not trust traffic unless given express permission by site admins. WAFs can also have customized rules and access hierarchies to fit individual needs for maximum security.

The U.S. Cybersecurity & Infrastructure Security Agency has an entire government website dedicated to educating citizens of the internet on just how dire these threats are. The U.S. Treasury released the following statement on October 21, 2020 detailing potential issues with companies who engage in ransomware payouts:

“Companies that facilitate ransomware payments to cyber actors on behalf of victims, including financial institutions, cyber insurance firms and companies involved in digital forensics and incident response, not only encourage future ransomware payment demands but also may risk violating OFAC regulations.”

Attack tactics are changing as defensive technology adapts to each new threat. Nevertheless, computers are not like humans. When faced with a virus, people can quarantine away and stay disconnected from other humans until the situation resolves. The purpose of today’s computers is primarily to communicate with other computers; so as long as they are sending and receiving data in any way, they may be faced with an infection.

The more system admins take a proactive stance on this age-old threat, the less advantage attackers will have in holding essential information hostage.

Brad Mitchell is the famed founder of MojoHost, which has won numerous XBIZ Awards for Web Host of the Year and earned many loyal clients for nearly two decades. Known for his dapper style and charismatic wit, Mitchell is a regular fixture at trade shows, where he frequently shares hard-won wisdom while striking profitable deals. Be sure to back up your data on MojoCloud in case of ransomware, or deploy MojoShield to stay safe. Contact brad@mojohost.com to learn more about the suite of services on tap.

Copyright © 2025 Adnet Media. All Rights Reserved. XBIZ is a trademark of Adnet Media.
Reproduction in whole or in part in any form or medium without express written permission is prohibited.

More Articles

profile

WIA Profile: Cathy Turns Creator Platform Experience Into a Model-First Playbook

As both a model and industry executive, Cathy lives in two worlds at once — and that’s exactly why so many creators trust her. “Since I do both things, I can act as the liaison between the model community and the rest of the SextPanther team,” she tells XBIZ.

Jackie Backman ·
opinion

From Compliance to Confidence: The Future of Safety in Adult Platforms

In numerous countries and U.S. states, laws now require platforms to prevent minors from accessing age-inappropriate material. But the need for safeguarding doesn’t end with age verification. Today’s online landscape also places adult companies at uniquely high risk for inadvertently facilitating exploitation, abuse or reputational harm, or of being accused of doing so.

Andy Lulham ·
opinion

What Adult Businesses Need to Know About Florida's Age Verification Law

The rise and proliferation of age verification laws has changed the landscape for the online adult industry. A recent and compelling example is the state of Florida, where Attorney General James Uthmeier has filed multiple complaints against major platforms as well as affiliates accused of violating the state’s AV law.

Corey D. Silverstein ·
opinion

Maintaining Brand Trust in the Face of Negative Press

Over the last year, several of our merchants have found themselves caught up in litigation over compliance with state age verification laws. Recently, Segpay itself was pulled into the spotlight, facing scrutiny over Florida’s AV statute, HB 3. These stories inevitably get picked up by both industry and mainstream news outlets.

Cathy Beardsley ·
opinion

How to Switch Payment Processors Without Disrupting Business

For many merchants, the idea of switching payment processors can feel pretty overwhelming. That’s understandable. After all, downtime can stall sales, recurring subscriptions can suddenly fail, or compliance gaps can put accounts at risk. Operating in a high-risk sector like the adult industry can further amplify the stress of transition.

Jonathan Corona ·
profile

WIA Profile: Katie

Katie is the ultimate girl’s girl. As community manager at Chaturbate, she answers DMs, remembers names, and shows up for creators and fellow businesswomen when it counts. She’s quick to credit the people around her, and careful to make space for others in every room she enters.

Women in Adult ·
opinion

How to Stay Legally Protected When Policies Get Outdated

The adult industry has long operated in a complex legal environment subject to rapid change. Now, a confluence of age verification laws, lawsuits, credit card processing and data privacy rules has created an urgent need for all industry participants — from major platforms to independent creators — to review and potentially overhaul their legal and operational policies.

Corey D. Silverstein ·
opinion

From Compliance Chaos to Crypto Clarity: Making the Case for Digital Payments in Adult

These are uncertain times for adult merchants. With compliance tightening and age verification mandates rising, the barrier to entry keeps getting higher.

Cathy Beardsley ·
opinion

Real-Time Insights to Streamline E-Payments and Stop Lost Sales

A slow checkout process is more than just annoying — it’s expensive. In a high-risk sector like the adult industry, even small delays or declined transactions can cost businesses thousands in lost revenue every month.

Jonathan Corona ·
profile

FSC's Valentine Leads Charge for Sex Worker Rights and Financial Access

Before ever stepping into a courtroom, Valentine already understood the power of presence. After all, they’ve shimmied on stages as a burlesque performer, consulted behind the scenes for creative businesses and moved through the adult industry not just as an advocate, but as a participant.

Jackie Backman ·
Show More