ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Did You Know Early Ransomware Spread via Floppy Disk?

Did You Know Early Ransomware Spread via Floppy Disk?

Ransomware might be a relatively new player in the battle for the Internet, but its short history shouldn’t belittle the damage that it can do to both businesses and users of personal computers. Perhaps you’ve had the misfortune to encounter it for yourself, and your files were locked down because of it. Regardless, ransomware is now a prevalent part of the online crime scene, and people are using it to extort money from innocent users, making it a considerable threat.

Initial Development
Ransomware might be used with malicious intent, but it wasn’t always meant to be used this way. In 1986, two Pakistani brothers, Basit and Amjad Alvi, built a piece of software that instructed users to call a phone number if they encountered a warning message. The goal was to use this program to identify piracy and protect the brothers’ assets, but with anything even remotely useful and helpful to society, someone out there managed to find a way to turn it against the masses and make a profit off of it.

Early Ransomware
The code created by the Alvi brothers was soon modified to lock down files, creating what’s known today as the PC Cyborg/AIDS virus, which was delivered on a floppy disk labeled “AIDS Information Introductory Diskette.” When it’s installed on the system, it restricts and hides files on the computer’s hard drive. The threat would then demand that the user pay $189 to a P.O. box in Panama in order to “renew their software license.”

The Return of Ransomware
Nearly two decades later, ransomware returned with a vengeance. In 2006, a trojan horse called GPCoder (also known as PGPCoder) was developed to encrypt files with common extensions (.doc, .html, .jpg, .xls, .zip, .rar, etc). They then extorted money out of the user by dropping a simple text file into each folder stating that the user had to pay in order to receive instructions on how to decrypt the files.

At around the same time, the software started to evolve and create new strains that would resemble the sophisticated attacks we see today. The type of encryption grew more powerful, which made it easier for hackers to use without placing themselves at much risk. The result is natural: more frequent ransomware attacks, which led to easy profits for hackers.

Contemporary Ransomware
In 2013, the world saw the debut of what’s considered the beginning of a contemporary ransomware takeover: CryptoLocker. CryptoLocker is delivered through infected email attachments that appear to come from legitimate sources. The ransomware itself is embedded in the email in the form of a .zip file that may be disguised as a .pdf file. Once the user unpackages the files, the ransomware is installed and adds a security key to the user’s registry. This allows the hacker to hijack the user profile and lock down the files on the system.

There are several known variants of CryptoLocker, many of which work the same way and produce the same results. One in particular, CryptoWall, is known to spread across infrastructures and infect multiple endpoints, making it exceptionally dangerous. Despite security companies’ best efforts to protect against ransomware, it has grown very popular and difficult to control once it’s been installed on a user’s PC.

In terms of your organization’s IT, there are several ways that you can protect your business’s assets. One of the best ways you can do so is by implementing a spam-blocking solution that keeps threatening messages out of your inbox in the first place. Additionally, it’s important to mitigate your losses in the event of a ransomware infection by keeping your data backed up and stored off-site--you know, just in case. If you get infected with ransomware, this is often the only way to recover your data without paying the fine.

To learn more about ransomware and what ClearView IT can do to keep your business safe, reach out to us at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Phishing Cybersecurity Business Management IT Services Backup Ransomware Data Backup Smartphone communications Upgrade Small Business Smartphones Microsoft Office Mobile Devices Network Managed IT Services Communication Data Recovery Quick Tips Productivity Social Media VoIP Users Mobile Device Tech Term Automation Windows 10 Business Continuity Facebook Disaster Recovery Covid-19 Passwords Holiday Browser Windows 10 Apps Managed Service IT Support Miscellaneous Cloud Computing Outsourced IT Managed Service Provider Internet of Things Data Management Remote Work Saving Money Operating System Government Gadgets Artificial Intelligence Networking Managed IT services Windows Workplace Strategy Spam WiFi Mobile Device Management Information Bandwidth Business Technology Encryption App Virtualization Blockchain Remote Server Employee/Employer Relationship Office 365 Budget Apple Information Technology History Gmail Office Two-factor Authentication Data Security Conferencing BDR Cybercrime Health Big Data Analytics Access Control Wi-Fi Patch Management Hacker Remote Monitoring Voice over Internet Protocol Cost Management Compliance Vendor Employer-Employee Relationship IT Management Training Document Management Help Desk Hacking Save Money Remote Computing Data loss BYOD Money Computing Vendor Management Customer Service Project Management Hard Drive Unified Threat Management Firewall Mobile Office Augmented Reality Search... Applications Managed Services Word Best Practice Legal IBM Vulnerabilities Website Retail Alert Data storage Hiring/Firing Outlook Password Cleaning Chrome Windows 11 Robot Paperless Office Antivirus Maintenance Social Mobile Computing Sports SaaS DDoS Remote Workers Marketing Data Breach Windows 7 Websites Twitter Running Cable Free Resource iPhone Meetings Education Cortana Mobility Law Enforcement End of Support Content Filtering Storage Printer How To Google Maps Monitoring Scam Router Healthcare VPN The Internet of Things YouTube User Travel Virtual Reality Update Social Engineering Cryptocurrency Black Market Laptop Taxes Excel Cooperation Politics Downtime Video Conferencing Settings Safety Machine Learning Virtual Machines Computer Repair PowerPoint Solid State Drive Physical Security Virtual Desktop Administration Professional Services Virtual Assistant Experience Presentation Specifications Chromebook Drones IT Consultant Start Menu Automobile Computer Care Managed Services Provider Downloads Customer Relationship Management Disaster Processor Virtual Private Network Vulnerability Co-Managed IT How To Entertainment Software as a Service Microchip Current Events Lithium-ion battery Data Protection Flexibility Solutions Multi-factor Authentication Hack Identity Theft Processors Integration Notifications Images 101 Unified Communications Display Saving Time HIPAA Google Docs Bluetooth Tech Terms Bitcoin Distributed Denial of Service Employees Computers Avoiding Downtime Managed IT Office Tips Memory Telephone Digital Private Cloud Wireless Technology Holidays eWaste Flash Social Network Virtual Machine intranet Access Time Management Public Cloud Telephone Systems Reviews Wireless Business Growth Data Analysis Optimization Shortcut Screen Reader Heating/Cooling Trends Teamwork Environment Mobile Technology 2FA Security Cameras Windows XP Data Storage Customer Resource management Hypervisor Audit Social Networking Inbound Marketing Devices Spyware Tip of the week File Sharing Banking Shopping Google Wallet Fileless Malware Medical IT Gamification SQL Server Redundancy Company Culture Supply Chain Messenger Paperless Deep Learning PCI DSS Telephone System Licensing Regulations Cache Backup and Disaster Recovery Unified Threat Management Workers Business Metrics Gig Economy Hosted Solution Directions Humor Electronic Payment Internet Service Provider Content Azure Desktop Workplace Books Business Communications CCTV Language Regulations Compliance Society Electronic Medical Records Managed IT Service Printing Accountants Database Touchscreen Phone System Staffing Memes Monitors Net Neutrality IP Address Visible Light Communication Emergency Scams Reading Computer Malfunction Human Resources Financial Data Windows 8 Health IT Equifax Vendor Mangement Tactics Hard Drive Disposal Samsung Risk Management IT Displays Advertising Username Uninterrupted Power Supply Cables Relocation Webcam Google Apps Freedom of Information Work/Life Balance Telework Tech Support Startup Business Mangement Computer Accessories Addiction Microsoft 365 email scam Tablets Smartwatch Recovery Navigation Communitications Competition Procurement Mobile Security Point of Sale News In Internet of Things Supercomputer LiFi FinTech User Tip Google Calendar Entrepreneur Legislation Network Management Virus Shortcuts Hacks CES Documents Network Congestion Evernote IT Assessment Application Writing Supply Chain Management Value Business Intelligence Reliable Computing Motion Sickness Fake News Organization Proxy Server Cyber security Comparison Emails Google Drive Service Level Agreement Computing Infrastructure Be Proactive Securty Smart Devices Remote Working Domains Management Knowledge Troubleshooting Device security Corporate Profile Scalability Microsoft Excel Administrator Employer Employee Relationship Text Messaging AI Proactive IT Trend Micro Television Wireless Headphones Telephony Going Green Transportation Business Cards Cabling Workplace Strategies Bring Your Own Device Digital Security Cameras Tech Electronic Health Records Error Wasting Time Tablet G Suite Tracking Music Bookmark eCommerce Mouse Modem VoIP Public Speaking Download Piracy Videos Term Surveillance Streaming Media Managing Costs Business Owner HTML Web Server Botnet Digital Payment Browsers SharePoint Keyboard Nanotechnology SSID Hard Drives Upload Employer/Employee Relationships Software License Worker Smart Technology Rental Service Media Micrsooft Google Play Development

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?