SHARE
Facebook X Pinterest WhatsApp

The Rise of Ransomware

I mentioned last Friday that the “McAfee Threats Report: Second Quarter 2012” pointed out the rise of ransomware as a security threat, and I wanted to talk more on that topic. Perhaps you’ve seen a story about ransomware that got some mainstream attention in recent weeks. The FBI sent out an urgent warning to say […]

Written By
SP
Sue Poremba
Sep 10, 2012

I mentioned last Friday that the “McAfee Threats Report: Second Quarter 2012” pointed out the rise of ransomware as a security threat, and I wanted to talk more on that topic.

Perhaps you’ve seen a story about ransomware that got some mainstream attention in recent weeks. The FBI sent out an urgent warning to say that the agency had received a number of complaints from people about being locked out of their computers after receiving a message from the FBI regarding illegal activities. The messages were caused by a virus known as Reveton ransomware. As the FBI’s warning explained:

Reveton is described as drive-by malware because unlike many viruses—which activate when users open a file or attachment—this one can install itself when users simply click on a compromised website. Once infected, the victim’s computer immediately locks, and the monitor displays a screen stating there has been a violation of federal law.

In the message received by the infected users, a payment was needed in order to unlock the computer. The FBI reported that a number of people were scared enough to pay the fee, which is exactly what the bad guys want. That’s how they make money on the virus.

Ransomware is pretty much as its name sounds. The malware gets on your computer and holds your information hostage until you pay a ransom. As the McAfee report described it:

The malware encrypts data or the entire computer and then, using anonymous payment methods, demands money to restore it. The cybercriminal need not find a processor for credit card payments.

Ransomware isn’t new. But as the McAfee report pointed out, the techniques have been improved and ransomware is more dangerous than ever. It renders machines unusable, kills data and, if on a network, it encrypts all of the data the user has access to.

As much as we’d like to think that savvy computer users are wise to scams that come across in email, not everybody using a computer knows much about basic security practices. And even savvy users get fooled at times. If you see an email threatening you because child pornography was found coming from your computer, would you react first or search for the signs of a scam? (Well, I know everyone reading this would definitely look for the scam first, but can you count on your coworkers and employees to do the same?)

McAfee provided a few tips on how to protect your data from ransomware. One is obvious: Don’t click on links in email without verifying it first. But the other should be obvious and isn’t always: Back up your data regularly. This goes for network and personal computers. It is important to remember that ransomware takes over your data. No backup means that data could be gone forever.

SP

Sue Poremba is freelance writer based on Central PA. She's been writing about cybersecurity and technology trends since 2008.

Recommended for you...

5G and Industrial Automation: Practical Use Cases
Kashyap Vyas
Apr 22, 2022
Understanding the Relationship Between 5G and Edge Computing
Collins Ayuya
Apr 19, 2022
Building a Private 5G Network for Your Business 
Kihara Kimachia
Apr 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.