opinion

A Brief History of Virus Profiteers

A Brief History of Virus Profiteers

Ransomware is as old as the internet itself. It has been causing havoc across computer networks worldwide for decades. Much like virus variants, it has adapted along the way and has a fascinating history.

In recent years, ransomware has made the news for disabling everything from oil pipelines to governments and big businesses. In the most egregious case, during the COVID pandemic, hospital networks were targeted by ransomware, encrypting essential patient data and operational systems that lives depended on. Last year alone, over 600 medical institutions were impacted by 92 total attacks, with attackers demanding millions of dollars for the safe decryption of this critical information. It is hard to say just how many individuals were harmed by these disruptions.

The purpose of today’s computers is primarily to communicate with other computers; so as long as they are sending and receiving data in any way, they may be faced with an infection.

Looking back, when did ransomware truly begin? Surprisingly, it originated with floppy disks in the late ’80s. In 1989, a virus called the AIDS Trojan, or Cyborg Virus, disabled systems and demanded that users send nearly $200 to an address in Panama to restore access. This small-scope attack tested the waters for what would develop into a multimillion-dollar ransomware sub-industry.

A critical factor in the history and development of ransomware has been the expansion of anonymous payment systems. While other computer viruses might profit from selling stolen information or manipulating data to shift geopolitics and exchange markets, ransomware relies on obtaining direct ransom payments. In the early days of ransomware, it was easier to collect payment via international PO boxes and other physical means, as these were less easily traced. However, this particular flavor of virus went relatively dormant in the early 2000s as physical payment methods became easier to trace.

There are prominent examples of ransomware attacks dating between 2005 and 2006, such as Gpcode, TROJ.RANSOM.A, Archiveus, Krotten, Cryzip and MayArchive. They were precursors to more advanced ransomware that would appear in the 2010s. By then, programming could take advantage of early cryptography to lock data with public encryption keys that are proven mathematically infeasible to break, even with powerful computing hardware and concerted effort across multiple networks.

The year 2010 also marked a breakthrough in the diversification of ransomware. Russian programmers released viruses that displayed pornographic images on users’ screens that could not be removed until a ransom was paid. They asked for $10 per user, netting a total bounty of $16 million across Russia and neighboring countries.

In 2013, the FBI MoneyPak ransomware virus used false identity to claim the attackers belonged to the FBI and had recognized illegal activity on users’ computers. Users were more likely to comply with payment, believing it to be a legal fee to evade further fines, much like a parking ticket.

Fast forward to 2019 and hackers have found ways to infect mobile devices, with one fringe example proving it’s possible to insert ransomware onto a DSLR camera, locking it beyond functionality, and displaying a ransom message akin to those found on desktop computers. In 2021, all devices connected to the internet are susceptible to ransomware in some form.

WHY RANSOMWARE IS SO LETHAL TO COMPUTERS TODAY

Ransomware invades individual systems and entire servers, commonly through trojans. A layperson might think they are protected from trojans because they have anti-malware or antivirus software installed — but it is not as simple as that. Attackers are aware of these primary defenses and are already steps ahead. You will not even know you have been affected by a trojan until it is too late.

Once executed, they sink their fangs into root-level files to start an irreversible encrypting of the drive. Encryption happens behind the scenes and goes undetected. Then, once complete, the malicious program turns the key, locking the system down. It sends the encryption key to the attacker at their home base, which could be anywhere in the world. This is when the user becomes aware they have been hacked.

A message will take over the screen, demanding that a ransom be sent via an untraceable method such as a cryptocurrency transaction. It might have a deadline that threatens to publish or erase the encrypted information should the money not be sent. By then, it is too late to do anything but pay the attacker, as modern encryption would take magnitudes of millions of years to brute-force open.

Because ransomware attacks are time-sensitive and irreversible, the only way to stay protected is to be proactive. A reactive approach using antivirus apps is ultimately futile against ransomware that has already taken hold of a system. Similarly, firewalls that are one-size-fits-all are no good at protecting against the complexity of today’s attacks.

Web application firewalls run in front of web hosting to filter out everything unsavory. They do not trust traffic unless given express permission by site admins. WAFs can also have customized rules and access hierarchies to fit individual needs for maximum security.

The U.S. Cybersecurity & Infrastructure Security Agency has an entire government website dedicated to educating citizens of the internet on just how dire these threats are. The U.S. Treasury released the following statement on October 21, 2020 detailing potential issues with companies who engage in ransomware payouts:

“Companies that facilitate ransomware payments to cyber actors on behalf of victims, including financial institutions, cyber insurance firms and companies involved in digital forensics and incident response, not only encourage future ransomware payment demands but also may risk violating OFAC regulations.”

Attack tactics are changing as defensive technology adapts to each new threat. Nevertheless, computers are not like humans. When faced with a virus, people can quarantine away and stay disconnected from other humans until the situation resolves. The purpose of today’s computers is primarily to communicate with other computers; so as long as they are sending and receiving data in any way, they may be faced with an infection.

The more system admins take a proactive stance on this age-old threat, the less advantage attackers will have in holding essential information hostage.

Brad Mitchell is the famed founder of MojoHost, which has won numerous XBIZ Awards for Web Host of the Year and earned many loyal clients for nearly two decades. Known for his dapper style and charismatic wit, Mitchell is a regular fixture at trade shows, where he frequently shares hard-won wisdom while striking profitable deals. Be sure to back up your data on MojoCloud in case of ransomware, or deploy MojoShield to stay safe. Contact brad@mojohost.com to learn more about the suite of services on tap.

Copyright © 2024 Adnet Media. All Rights Reserved. XBIZ is a trademark of Adnet Media.
Reproduction in whole or in part in any form or medium without express written permission is prohibited.

More Articles

profile

WIA Profile: Samantha Beatrice

Beatrice credits the sex positivity of Montreal for ultimately inspiring her to pursue work in adult entertainment. She had many friends working in the industry, from sex workers to production teams, so it felt like a natural fit and offered an opportunity to apply her marketing and social media savvy to support people she truly believes in and wants to see succeed.

Women In Adult ·
opinion

Understanding the Latest Server Processors

Over the last decade, we mostly stopped talking about CPU performance. Recently, however, there has been a seismic and exciting change in the CPU landscape, due to innovation by a chip company called Advanced Micro Devices (AMD).

Brad Mitchell ·
opinion

User Choice, Privacy and the Importance of Education in AV

As we discussed last month, age verification in the adult sector is critical to ensuring legal compliance with ever-evolving regulations, safeguarding minors from inappropriate content and protecting the privacy of adults wishing to view adult content.

Gavin Worrall ·
opinion

Maintaining Payment Processing Compliance When the Goalpost Keeps Moving

VIRP is the new four-letter word everyone loves to hate. The Visa Integrity Risk Program went into effect last year, and affects several business types — including MCC 5967, which covers adult and anything else with nudity, and MCC 7273, dating services that don’t allow nudity.

Jonathan Corona ·
opinion

Making the Most of Your Sales Opportunities

The compliance road has been full of twists and turns this year. For many, it’s been a companywide effort just to make it across that finish line. Hopefully, most of us can now return our attention to some important things we’ve left on the back burner for months — like driving revenue.

Cathy Beardsley ·
profile

YourPaysitePartner Marks 25-Year Anniversary Amid Indie Content Renaissance

For 25 years, YourPaysitePartner has teamed up with stars and entrepreneurial brands to bring their one-stop-shop adult content dreams to life — and given the indie paysite renaissance of the past few years, the company’s efforts have paid off in spades.

Alejandro Freixes ·
opinion

WIA Profile: B. Wilde

B. Wilde considers herself a strategic, creative, analytical and entertaining person by nature — all useful traits for a “marketing girlie,” a label she happily embraces.

Women In Adult ·
opinion

Proportionality in Age Verification

Ever-evolving age verification (AV) regulations make it critical for companies in the adult sector to ensure legal compliance while protecting the privacy of adults wishing to view adult content. In the past, however, adult sites implementing AV solutions have seen up to a 60% drop in traffic as a result.

Gavin Worrall ·
opinion

Goodbye to Noncompete Agreements in the US?

A noncompetition agreement, also known as a noncompete clause or covenant not to compete, is a contract between an employer and an employee, or between two companies.

Corey D. Silverstein ·
opinion

The Search for Perfection in Your Payments Page

There has been a lot of talk about changes to cross sales and checkout pages. You have likely noticed that acquirers are now actively pushing back on allowing merchants to offer a negative option, upsell or any cross sales on payment pages.

Cathy Beardsley ·
Show More