{"id":11794,"date":"2017-06-13T08:00:04","date_gmt":"2017-06-13T13:00:04","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=11794"},"modified":"2017-07-11T11:54:23","modified_gmt":"2017-07-11T16:54:23","slug":"history-of-ransomwares-evolution","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/history-of-ransomwares-evolution\/","title":{"rendered":"How Ransomware Has Evolved Over the Past 5 Years"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Ransomware attacks are becoming more powerful and more frequent, as demonstrated by the latest <\/span><a href=\"http:\/\/www.telegraph.co.uk\/technology\/0\/ransomware-does-work\/\"><span style=\"font-weight: 400;\">WannaCry <\/span><b>ransomware<\/b><span style=\"font-weight: 400;\"> attack<\/span><\/a><span style=\"font-weight: 400;\">. More than 200,000 organizations \u2014 including the UK\u2019s National Health Service \u2014 in 150 countries were infected with WannaCry ransomware. The WannaCry attack used stolen information from the National Security Agency (NSA). These NSA tools have been very useful to hackers, who have been able to carry out more sophisticated <\/span><a href=\"https:\/\/www.nytimes.com\/2017\/05\/19\/business\/hacking-malware-wanncry-ransomware-deadline.html?mcubz=0&amp;_r=0\"><span style=\"font-weight: 400;\">spyware and <\/span><b>ransomware<\/b><span style=\"font-weight: 400;\"> attacks<\/span><\/a><span style=\"font-weight: 400;\">. Click here to protect your device by quickly checking for hidden malware with Security Scan:<\/span><\/p>\n<p><center><a href=\"psafe:\/\/launch\/antivirus_quick\" rel=\"attachment wp-att-9829\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-9829\" src=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/04\/run-security-scan-1-300x67.jpg\" alt=\"run-security-scan\" width=\"300\" height=\"67\" srcset=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/04\/run-security-scan-1-300x67.jpg 300w, https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/04\/run-security-scan-1.jpg 353w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/center><span style=\"font-weight: 400;\">Although Security Scan is a strong measure individually, these kinds of attacks are likely to grow, too, as more of the NSA\u2019s hacking tools are published. In this instance, WannaCry took advantage of a vulnerability in Microsoft\u2019s older software. Microsoft had issued a patch for the vulnerability, but users either didn\u2019t update their software or didn\u2019t receive the update. This shows how important it is to make sure that you receive the latest security updates for your devices, in addition to scanning your device for ransomware, so that you can be protected against all types of malware. <\/span><\/p>\n<p><b>Read More: <\/b><a href=\"https:\/\/www.psafe.com\/en\/blog\/ransomware-attacks-increasing-android\/\"><b>Ransomware Attacks Are Increasing on Android<\/b><\/a><\/p>\n<p><b>Ransomware Through History<\/b><\/p>\n<p><span style=\"font-weight: 400;\">In comparison to other malware, the history of ransomware is much shorter. The first case of ransomware occurred in 1989, and targeted the healthcare industry (still a major ransomware target today). However, ransomware didn\u2019t become the threat that it is today until around 2005. Since then, two of the most popular types of ransomware have been crypto and locker ransomware. Crypto<\/span> <span style=\"font-weight: 400;\">ransomware<\/span> <span style=\"font-weight: 400;\">encrypts users\u2019 files, whereas locker ransomware only locks users out of their files. A hybrid of the two types has become more popular in recent years.<\/span><\/p>\n<p><b>A Ransomware Evolution<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Ransomware has evolved considerably over the last five years, and new, <\/span><a href=\"https:\/\/www.storagecraft.com\/blog\/5-ways-ransomware-evolution-2017\/\"><b>different types of ransomware<\/b><\/a><span style=\"font-weight: 400;\"> are continuously appearing. In 2016, there were about 4,000 ransomware attacks each day, and roughly 70% of businesses infected with ransomware paid the ransom. With the release of the NSA hacking tools, and the rise of automation (allowing hackers to target more people with little effort), this will likely grow in 2017.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Hackers are now sending ransomware in PDFs via email. If a victim clicks on the PDF, he or she will be taken to a web page mimicking Google to type in personal information. This is becoming a more recent trend in the world of malware, with various malicious file types being sent over email to victims. Files may even include ransomware powerpoint presentations (ransomware ppt). The evolution of ransomware also includes Internet of Things devices as a growing target. This is because these devices are always connected to the Internet, and often have poor security or receive few updates.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Major ransomware attacks are increasing worldwide. Find out how this type of malware has evolved over the last several years.<\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[5],"tags":[301,303,308,312,1458,249,161],"class_list":["post-11794","post","type-post","status-publish","format-standard","hentry","category-security","tag-app2","tag-app3","tag-app6","tag-app8","tag-ransomware","tag-security","tag-virus"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/11794","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=11794"}],"version-history":[{"count":0,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/11794\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=11794"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=11794"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=11794"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}