Call Today

+1 440-322-ILER(4537)

}
Hours

Mon – Fri, 9am to 5pm

Tech Blog

your go-to resource for all things tech! Stay updated on the latest trends, industry insights, and expert tips to navigate the ever-evolving world of technology.

What You Need to Know About Ransomware

by | Aug 5, 2021

                The first ransomware attack in history is a strange story. It was attempted by a man named Joseph Popp, a Harvard-educated evolutionary biologist who did AIDS research. Although his exact motivations were unclear, he went to the trouble of sending 20,000 floppy disks to people that attended an AIDS conference run by the World Health Organization. The disks had a note on them claiming that they had research information but instead locked the person’s computer and demanded the person send $189 to an obscure address in the country of Panama in order to gain access back to their device. Although this was a bizarre attempt that ultimately got Popp thrown in jail, the method has survived into much more organized, sophisticated, and devastating ransomware attacks.

                Simply put, a ransomware attack locks and encrypts a victim’s computer preventing them from accessing certain files, and then demands that the victim pays a ransom in order to regain access. In other words, it is a cyberattack that holds a user’s precious files hostage. In order to pressure the victim into paying the ransom, the ransomware attack will often give the victim a set amount of time to pay or risk losing the data forever. Even if the ransom is paid, there is still no guarantee that the hostage files will be restored.

                There are many kinds of ransomware attacks. One common type is called Crypto Malware which targets files, folders, and hard drives. Another kind is Lockers, which locks the user out of their device. Scareware is a type that acts as an anti-virus cleaning tool. It will claim that there is malicious content on the victim’s computer and then demand a payment to remove it. It will often lock the computer or flood the device with annoying pop-up messages. Doxware is another kind that threatens to publish a victim’s information online if they do not pay the ransom. Some of the most common targets of ransomware are groups that do not have high IT security, such as universities. Universities tend to have a lot of files in their systems, making them ripe targets of ransomware. Big organizations, such as banks, medical facilities, and government agencies that have the ability to pay a ransom quickly are also common targets.

In response to the ransomware attacks on the Colonial Pipeline and JBS earlier this year, the Biden administration has set up a ransomware task force to combat future attacks and is offering a 10-million-dollar reward to anyone who has information about ransomware gangs. The Russian organization REvil which was responsible for the May ransomware attack on the Colonial Pipeline seems to have disappeared from the Dark Web and it may be that the United States or even Russia (under United States pressure) secretly took them down.

While political action is being taken, there are other things that individuals can do to protect themselves and their companies from ransomware attacks. It is imperative for users to back up all their files. Users can also install ransomware protection and be careful not to click on sketchy links. However, if one does get hit by a ransomware attack there is also a proper way to respond. Of course, if one has their computer backed up, there may be no need to give in to the attacker’s demands. It is almost never a good idea to pay the ransom, especially because, as stated above, the stolen files may not be given back. A victim of a ransomware attack can also try using decryption tools to restore their files or try resetting their computer to their factory settings. A lot of the victims of the first ransomware attack by Joseph Popp simply used decryption tools to restore their files and ended up not losing their information. The story provides a still-relevant lesson in finding simple solutions to solve problems rather than making a decision based on panic and impulse. If you need a great backup solution, Iler Networking offers multiple options that can be tailored to your needs. For more information, call us at 440-322-4537.

AT&T Attack Reveals 73 Million Customer Records Exposed On The Dark Web

In a statement released by the largest telecommunications company in the United States, AT&T, they shared that they recently discovered a dataset for sale on the “dark web” that contained information for about 7.6 million current AT&T account holders and 65.4...

10 Things Great IT Providers Always Do

What sets high-quality, reliable IT support apart from mediocre or substandard support? Is it lower prices? Flat-fee service? At Iler Networking & Computing, we believe there are many deciding factors that separate even the good from the great providers, but when...

Cyber-Attack Takes Omni Hotels & Resorts Offline; Here’s How To Travel Safely

Another day, another cyber-attack! In early April, Omni Hotels & Resorts was the victim of a cyber-attack that brought down the entire IT system and led to a company-wide outage. The organization took immediate action and brought the entire network offline to...
Data Backups

Why 60% Of Data Backups Fail Businesses When They Need Them Most

From natural disasters and cyber-attacks to accidental deletion, there are many reasons a business needs to back up its data. However, Avast’s latest findings on disaster recovery highlight an alarming issue for small and medium-sized businesses (SMBs): 60% of data...

What Is Bad IT Support Costing Your Business?

In our technology-driven world, efficient IT support is the backbone of any successful business. From ensuring seamless operations to safeguarding sensitive data, reliable IT services are crucial for maintaining productivity and protecting your bottom line. However,...