What was once a simple piece of malware discovered just 20 years ago this month exhibited its capacity which transformed the entire universe of cyber-security that we know of today?
Initially expected to just harvest the passwords of a couple of local internet providers, the malware, dubbed as ‘LoveBug’ spread far and wide, infecting more than 45 million devices to turn into the first piece of malware to truly take businesses offline.
LoveBug was the shift of malware from a constrained exposure to mass demolition. 45 million compromised devices daily could rise to 45 million daily payments.
Be that as it may, eleven years before anybody had known about LoveBug, the IT industry saw the first-ever main case of ransomware, as AIDS Trojan. AIDS Trojan which spread through infected floppy disks sent to HIV specialists as a feature of a knowledge-sharing activity.
The ‘lovechild’ of LoveBug and AIDS Trojan was the ransomware that followed, with GPCoder and Archievus hitting organizations around the globe through which the hackers additionally bridled ecommerce sites to discover better ways to receive payments.
The protection industry responded by taking necessary steps with ‘good actors’ cooperating to decipher the encryption code on which Archievus depended, and sharing it broadly to assist victim with abstaining from paying any ransom.
From that point forward the ‘cat and mouse’ game has proceeded with viruses like CryptoLocker, CryptoDefense, and CryptoLocker2.0 constructing new attack strategies, and the protection industry executing new defenses. Presently ransomware has become increasingly sophisticated and progressively prevalent as targets today are more averse to be individuals since large businesses can pay enormous sums of cash.
And yet, data protection has become progressively sophisticated as well, with certain four areas that should now be a part of each business’ ransomware strategy: protect, detect, respond, and recover. Social engineering and phishing are also presently becoming progressively central to the success of a ransomware attack.
The LoveBug was effective in a scattergun fashion, yet at the same time depended on social engineering.
Had individuals been less disposed to open an email with the subject line ‘I love you’, the spread of the malware would have been ‘far more limited’.
Nevertheless, the users presently ought to be more alert of the increasingly diverse threats in light of the fact that inexorably, hackers are expanding their threats data exfiltration or public exposure on the off chance that they feel that leaking data may be progressively ‘persuasive’ for their targets.
Thus so as to react to the issue, it’s essential to have backup copies of data and to comprehend the nature and estimation of the information that may have been undermined in any way.