Woburn, MA – December 8, 2016 – In 2016, ransomware attacks on businesses increased three-fold: which represents a change from an attack every 2 minutes in January to one every 40 seconds by October. For individuals, the rate of increase went from every 20 seconds to every 10 seconds. With more than 62 new families of ransomware introduced during the year, the threat grew so aggressively that Kaspersky Lab has named ransomware its key topic for 2016. .
2016 revealed the extent to which the Ransomware-as-a-Service business model now appeals to criminals who lack the skills, resources or inclination to develop their own. Under the arrangement, code creators offer their malicious product ‘on demand’, selling uniquely modified versions to customers who then distribute it through spam and websites, paying a commission to the creator – the main financial beneficiary.
“The classic ‘affiliate’ business model appears to be working as effectively for ransomware as it does for other types of malware. Victims often pay up so money keeps flowing through the system. Inevitably this has led to us seeing new cryptors appear almost daily,” said Fedor Sinitsyn, Senior Malware Analyst, Kaspersky Lab.
The Evolution of Ransomware in 2016
Throughout 2016, Kaspersky Lab discovered that ransomware continued its rampage across the world, becoming more sophisticated and tightening its hold on data, devices, individuals and businesses, including the following:
- Attacks on businesses increased significantly. According to Kaspersky Lab research, one in every five businesses worldwide suffered an IT security incident as a result of a ransomware attack and one in every five smaller business never got their files back, even after paying.
- Some industry sectors were harder hit than others, but Kaspersky Lab research shows there is no such thing as a low-risk sector: with the highest rate of attack around 23 percent (Education) and the lowest 16 percent (Retail and Leisure).
- ‘Educational’ ransomware, developed to give system administrators a tool to simulate ransomware attacks was quickly and ruthlessly exploited by criminals, giving rise to Ded_Cryptor and Fantom, among others.
- New approaches to ransomware attacks seen for the first time in 2016 included disk encryption, where attackers block access to, or encrypt, all files at once – Petya is one example. Dcryptor, also known as Mamba, went one step further, locking down the entire hard drive, with the attackers brute-forcing passwords for remote access to a victim machine.
- The ransomware Shade demonstrated the ability to change its approach to a victim if an infected computer turned out to belong to financial services, downloading and installing spyware instead of encrypting the victim’s files.
- There was a marked rise in low-quality, unsophisticated ransomware Trojans with software flaws and sloppy errors in the ransom notes; increasing the likelihood of victims never recovering their data.
Fortunately, 2016 also saw the world begin to unite to fight back against ransomware. The No More Ransom project, launched in July, brings together law enforcement and security vendors to track down and disrupt the big ransomware families, helping individuals to get their data back and undermining the criminals’ lucrative business model.
The latest versions of Kaspersky Lab products for smaller companies have been enhanced with anti-cryptomalware functionality. In addition, a new, free anti-ransomware tool has been made available for all businesses to download and use, regardless of the security solution they use.
The full text of the report “Kaspersky Security Bulletin 2016 – Story of the Year: The Ransomware Revolution” is available here. It also includes advice on how to stay safe and why not to pay the ransom.
Other sections of the Kaspersky Security Bulletin include the Threat Predictions 2017 and Number of the Year. The Executive Summary, Review and Statistics will be available in December.