What is 'Ransomware'

Ransomware is a cyber-extortion tactic that uses malicious software to hold a user’s computer system hostage until a ransom is paid. Ransomware attackers usually demand ransom in Bitcoin currency due to the perceived anonymity of transacting with cryptocurrency. The malicious software locks a user’s computer for a limited time after which the ransom increases in price or the user’s data is destroyed. Ransomware is also known as Crypto-Ransomware.

BREAKING DOWN 'Ransomware'

Ransomware is a rapidly advancing criminal activity that affects businesses, financial institutions, government agencies, medical institutions and other organizations; it is the product of the advancement of digital technology. Although the advancement of digital technology has made a way for companies to enhance their relationships with consumers by offering more personalized services at personalized costs, technology isn't only used by legitimate users to improve their processes. Miscreants are also using emergent technology tools to improve their online attacks, either for fun or profit. Data breaches are done to steal personally identifiable information of individuals that will be sold through underground web channels for legal tender or cryptocurrencies. Cyberattacks like Denial of Service (DoS) may be carried out for fun or to make a statement. Some attackers deny a business access to its computer by demanding a certain amount of Bitcoin as payment in order to gain re-entry into the system. This latter unscrupulous means of getting a paycheck is done through Ransomware, which in a way is a form of a DoS attack.

Ransomware is a type of malicious software, or malware, that encrypts a computer’s system data with a key that only the attacker has. The malware is normally injected in an email attachment, software, or unsecured website. A user who tries to access any of these infected programs will trigger the ransomware which either locks the computer screen or encrypts the files in the system. A full-screen window pops up with information that states the user’s computer has been blocked, the amount in money or Bitcoins required to unlock the system, and a countdown timer which indicates the amount of time left before the data held hostage is destroyed or before the ransom is increased. Ransomware attackers usually demand payment to be wired through Western Union or paid through a specialized text message. Some attackers demand payment in the form of gift cards like an Amazon or iTunes Gift Card. Ransomware demands can be as low as a few hundred dollars to as much as $50,000. After payment is made, the hackers decrypt the files and release the system.

Ransomware attackers can infect many computers at once through the use of botnets. A botnet is a network of devices compromised by cybercriminals without the knowledge of the owners of the devices. The hackers infect the computers with malware that gives them control of the systems, and use these breached devices to send millions of compromised email attachments to other devices and systems. By kidnapping multiple systems and expecting the ransom to be paid, the perpetrators are banking on having a huge payday.

Examples of Ransomware

A company that has been held hostage by ransomware can have its proprietary information destroyed, operations disrupted, reputation harmed, and finances lost. In 2016, Hollywood Presbyterian Medical Center paid about $17,000 in Bitcoins to ransomware attackers who had taken the data of the hospital’s patients hostage. During the crisis, some patients had to be transferred to other hospitals for treatment and the medical records system was inaccessible for ten days, disrupting the daily operations of the hospital.

  1. Denial Of Service Attack (DoS)

    A Denial Of Service Attack (DoS) is an intentional cyberattack ...
  2. Cybersecurity

    Cybersecurity refers to the measures taken to keep electronic ...
  3. 51% Attack

    51% attack refers to an attack on a blockchain by a group of ...
  4. Data Loss

    Data loss occurs when valuable and/or sensitive information on ...
  5. Supply Chain Attack

    A supply chain attack is a cyberattack that attempts to inflict ...
  6. Threat Modeling

    Threat modeling is evaluating what needs to be protected in the ...
Related Articles
  1. Tech

    How Advisors Can Combat Ransomware

    Ransomware is malicious technology that’s becoming increasingly commonplace in corporate computer network. Here's how to combat it.
  2. Investing

    Report: Microsoft Charged for 'WannaCry' Patch

    Microsoft opted to charge users for a patch that would have slowed the global ransomware attack.
  3. Tech

    Cryptocurrency Mining Malware Attacks Are a Threat

    More than 1.65 million computers have been targeted in malware attacks related to cryptocurrency mining.
  4. Investing

    New Cyber Attack Exploits Microsoft Bug, Generates Digital Currency

    Another cyber attack relying on a Microsoft bug is spreading around the globe at the same time the hacking group Shadow Brokers is warning of more pain to come.
  5. Tech

    What is Illicit Cryptomining?

    Illicit cryptomining is when malicious parties try to surreptitiously mine for cryptocurrency using others' computing power.
  6. Financial Advisor

    Your Financial Advisory Firm Has Been Hacked. Now What?

    Taking the right steps following a cyber attack can mitigate the impact on clients.
  7. Investing

    Microsoft Brand 'Largely Unscathed' By WannaCry Attack: Report

    The WannaCry cyberattack that swept across the globe earlier in May, exploited a bug in unpatched Microsoft operating systems and it's time to assess whether it caused a dent in the company's ...
  8. Investing

    Android Phones Vulnerable to Wi-Fi Attacks: Report

    Cybersecurity experts say a new kind of attack lets hackers read Wi-Fi traffic, inject malware.
  9. Insurance

    A Guide To Kidnap & Ransom Insurance

    Every year, thousands of people are kidnapped for ransom all over the world. This insurance offers protection – and peace of mind.
  10. Tech

    Bitcoin Gold Hack Shows 51% Attack Is Real

    Bitcoin Gold might be at the receiving end of a 51% attack. If true, this theoretically means a hacker can take control of the cryptocurrency.
  1. Who Are Apple's Main Competitors in Tech?

    Explore Apple's competitive position in the many industries in which it operates, and learn about the different products ... Read Answer >>
  2. How do Internet companies profit if they give away their services for free?

    Learn how companies in the Internet sector make a profit when service, content and user applications are offered at no cost ... Read Answer >>
  3. What are the pros and cons of gift cards?

    Examine the pros and cons of physical and digital gift cards. Learn about protection in case of loss, monitoring spending ... Read Answer >>
  4. How does a block chain prevent double-spending of Bitcoins?

    Find out how double-spending is prevented in the Bitcoin server and how transactions are posted and verified on the Bitcoin ... Read Answer >>
Trading Center