Skip to main content

Ransomware, malware operations shut down, but not going away

ransomware hospital hackers demand more money ransomeware
Brian A Jackson/Shutterstock
It’s hard to imagine a more significant blight on the Internet than ransomware. Forget malicious destruction, forget spying on you — ransomware takes over a system, takes over your files, and demands money in order to (maybe) return them to you. So when news emerges where one of these operations is taken down, that’s a good thing.

Researchers from Cisco Systems announced they were behind the takedown of a massive ransomware operation run by a cyber criminal group. The take from this operation was an estimated $34 million per year.

Recommended Videos

The report further states a number of estimates, including:

  • Up to 90,000 victims were targeted per day
  • The full scope of all Angler Exploit activity could exceed $60 million annually
  • This network was responsible for up to 50 percent of all Angler Exploit activity
  • A $300 ransom was paid by about 3 percent of the victims
  • The exploit servers had a life of one day
Please enable Javascript to view this content

In the meantime, other types of malware continue to be incredibly hard to put down for good, despite efforts to take down these massive cybercriminal operations. The latest example was the resurrection of Dridex malware. Officials from the United States and United Kingdom said in early October that the botnet behind this flavor of malware had been taken down. A serious financial threat to the average consumer, this malware is known for the malicious behavior of monitoring financial login details and other personal information. Hackers find a way to access financial accounts and cause very big problems.

When the Dridex botnet takedown was announced, it was also disclosed that a 30-year-old Moldovan man named Andrey Ghinkul was sought for extradition in connection to $10 million malware scam. There have been no developments there, but no less than two weeks later, reports started to come in from Palo Alto Networks of increased Dridex activity detected throughout its networks. Propagating in email, the spectrum of potential victims, combined with the financial implications of this malware, is an issue with great impact.

The threat that malware and ransomware wield have produced considerable headaches for many institutions and individuals. The continued risk of loss of stolen intellectual property, credit card info, and personally identifiable information (PII) have many security professionals, law enforcement, and companies worried. These operations continue to generate hundreds of millions of dollars annually, with no end in sight. A secretive marketplace for unknown vulnerabilities, specialized services to modify code, and the trade of information has been the bane of efforts to curb these matters.

Steps to protect yourself against the threat follow the proven course of keeping computers, software, and anti-malware up to date.  Finally, if you suspect you’ve been compromised, contact a professional.

John Casaretto
Former Digital Trends Contributor
John is the founder of the security company BlackCert, a provider of SSL digital certificates and encryption products. A…
PayPal vs. Venmo vs. Cash App vs. Apple Cash: which app should you use?
PayPal, Venmo, Cash App, and Apple Wallet apps on an iPhone.

We’re getting closer every day to an entirely cashless society. While some folks may still carry around a few bucks for emergencies, electronic payments are accepted nearly everywhere, and as mobile wallets expand, even traditional credit and debit cards are starting to fall by the wayside.

That means many of us are past the days of tossing a few bills onto the table to pay our share of a restaurant tab or slipping our pal a couple of bucks to help them out. Now, even those things are more easily doable from our smartphones than our physical wallets.

Read more
How to change margins in Google Docs
Laptop Working from Home

When you create a document in Google Docs, you may need to adjust the space between the edge of the page and the content --- the margins. For instance, many professors have requirements for the margin sizes you must use for college papers.

You can easily change the left, right, top, and bottom margins in Google Docs and have a few different ways to do it.

Read more
What is Microsoft Teams? How to use the collaboration app
A close-up of someone using Microsoft Teams on a laptop for a videoconference.

Online team collaboration is the new norm as companies spread their workforce across the globe. Gone are the days of primarily relying on group emails, as teams can now work together in real time using an instant chat-style interface, no matter where they are.

Using Microsoft Teams affords video conferencing, real-time discussions, document sharing and editing, and more for companies and corporations. It's one of many collaboration tools designed to bring company workers together in an online space. It’s not designed for communicating with family and friends, but for colleagues and clients.

Read more