ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Did You Know Early Ransomware Spread via Floppy Disk?

Did You Know Early Ransomware Spread via Floppy Disk?

Ransomware might be a relatively new player in the battle for the Internet, but its short history shouldn’t belittle the damage that it can do to both businesses and users of personal computers. Perhaps you’ve had the misfortune to encounter it for yourself, and your files were locked down because of it. Regardless, ransomware is now a prevalent part of the online crime scene, and people are using it to extort money from innocent users, making it a considerable threat.

Initial Development
Ransomware might be used with malicious intent, but it wasn’t always meant to be used this way. In 1986, two Pakistani brothers, Basit and Amjad Alvi, built a piece of software that instructed users to call a phone number if they encountered a warning message. The goal was to use this program to identify piracy and protect the brothers’ assets, but with anything even remotely useful and helpful to society, someone out there managed to find a way to turn it against the masses and make a profit off of it.

Early Ransomware
The code created by the Alvi brothers was soon modified to lock down files, creating what’s known today as the PC Cyborg/AIDS virus, which was delivered on a floppy disk labeled “AIDS Information Introductory Diskette.” When it’s installed on the system, it restricts and hides files on the computer’s hard drive. The threat would then demand that the user pay $189 to a P.O. box in Panama in order to “renew their software license.”

The Return of Ransomware
Nearly two decades later, ransomware returned with a vengeance. In 2006, a trojan horse called GPCoder (also known as PGPCoder) was developed to encrypt files with common extensions (.doc, .html, .jpg, .xls, .zip, .rar, etc). They then extorted money out of the user by dropping a simple text file into each folder stating that the user had to pay in order to receive instructions on how to decrypt the files.

At around the same time, the software started to evolve and create new strains that would resemble the sophisticated attacks we see today. The type of encryption grew more powerful, which made it easier for hackers to use without placing themselves at much risk. The result is natural: more frequent ransomware attacks, which led to easy profits for hackers.

Contemporary Ransomware
In 2013, the world saw the debut of what’s considered the beginning of a contemporary ransomware takeover: CryptoLocker. CryptoLocker is delivered through infected email attachments that appear to come from legitimate sources. The ransomware itself is embedded in the email in the form of a .zip file that may be disguised as a .pdf file. Once the user unpackages the files, the ransomware is installed and adds a security key to the user’s registry. This allows the hacker to hijack the user profile and lock down the files on the system.

There are several known variants of CryptoLocker, many of which work the same way and produce the same results. One in particular, CryptoWall, is known to spread across infrastructures and infect multiple endpoints, making it exceptionally dangerous. Despite security companies’ best efforts to protect against ransomware, it has grown very popular and difficult to control once it’s been installed on a user’s PC.

In terms of your organization’s IT, there are several ways that you can protect your business’s assets. One of the best ways you can do so is by implementing a spam-blocking solution that keeps threatening messages out of your inbox in the first place. Additionally, it’s important to mitigate your losses in the event of a ransomware infection by keeping your data backed up and stored off-site--you know, just in case. If you get infected with ransomware, this is often the only way to recover your data without paying the fine.

To learn more about ransomware and what ClearView IT can do to keep your business safe, reach out to us at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Phishing Cybersecurity IT Services Backup Ransomware Data Backup communications Smartphone Upgrade Smartphones Small Business Microsoft Office Mobile Devices Network Managed IT Services Communication Data Recovery Quick Tips Productivity Users Social Media VoIP Mobile Device Automation Tech Term Windows 10 Facebook Business Continuity Disaster Recovery Passwords Holiday Covid-19 IT Support Apps Browser Managed Service Windows 10 Miscellaneous Cloud Computing Outsourced IT Internet of Things Managed Service Provider Remote Work Data Management Government Saving Money Operating System Artificial Intelligence Managed IT services Networking Windows Gadgets Workplace Strategy Server Information Bandwidth WiFi Encryption Mobile Device Management App Remote Business Technology Virtualization Blockchain Spam Budget Gmail Office Employee/Employer Relationship Two-factor Authentication History Apple Office 365 Information Technology Conferencing Access Control Analytics Data Security Cybercrime Wi-Fi BDR Big Data Health Hacker Voice over Internet Protocol Document Management Remote Computing Patch Management Save Money Compliance Vendor Remote Monitoring Help Desk Hacking IT Management Employer-Employee Relationship Cost Management Training Legal Money Hiring/Firing Mobile Office Outlook Data storage Customer Service Unified Threat Management Firewall Password Managed Services Applications Augmented Reality Word Project Management IBM Vulnerabilities Website BYOD Computing Search... Vendor Management Hard Drive Best Practice Data loss Retail Alert Printer Update Remote Workers User Sports Social SaaS Windows 7 DDoS Free Resource Data Breach Travel Virtual Reality Chrome Paperless Office How To Social Engineering Antivirus iPhone Cryptocurrency Education Cortana Maintenance Black Market Content Filtering Cleaning Mobile Computing Robot Monitoring Router Healthcare Marketing Websites The Internet of Things Mobility Running Cable Meetings YouTube Google Maps Storage Scam Twitter Laptop Windows 11 Law Enforcement End of Support VPN Tech Terms HIPAA Virtual Desktop Managed IT Identity Theft Experience Digital Virtual Assistant Hack Managed Services Provider Notifications Unified Communications Taxes Virtual Private Network Google Docs Bluetooth Current Events Disaster Processor Distributed Denial of Service Office Tips Private Cloud Solutions Memory Physical Security PowerPoint Lithium-ion battery Images 101 Administration Integration Display Multi-factor Authentication Presentation Politics Start Menu Specifications Machine Learning Settings Processors Downloads IT Consultant Computer Care Employees Vulnerability Saving Time Solid State Drive Avoiding Downtime Customer Relationship Management Holidays Co-Managed IT Software as a Service Data Protection Computers Entertainment Bitcoin Chromebook Drones Cooperation Telephone Wireless Technology Video Conferencing Automobile eWaste Virtual Machines Excel Computer Repair How To Microchip Downtime Flexibility Professional Services Safety Fileless Malware Tablet Business Communications G Suite Tip of the week Internet Service Provider In Internet of Things Azure Managed IT Service Hacks Mouse Network Congestion VoIP Gamification Tracking Company Culture Regulations Compliance Regulations Memes Reliable Computing Workplace Writing Telephone System Directions Backup and Disaster Recovery Human Resources Web Server Net Neutrality Financial Data SharePoint Content Digital Payment Desktop Electronic Medical Records Worker Accountants Risk Management Business Owner IT Scalability Scams Text Messaging Staffing Proactive IT Access Database Google Apps Administrator Public Cloud Telework Bring Your Own Device IP Address Time Management Health IT Equifax Smartwatch Communitications Microsoft 365 Cables Audit Music Spyware Tactics Hard Drive Disposal Procurement File Sharing FinTech Username Redundancy Startup CES Inbound Marketing Freedom of Information IT Assessment Point of Sale Value Recovery Navigation Competition Cache Addiction email scam Supply Chain Management Botnet Workers Mobile Security Organization Cyber security Rental Service Shortcuts Micrsooft Unified Threat Management User Tip Entrepreneur Legislation News Smart Devices LiFi Flash Telephone Systems Documents Printing Evernote Business Growth Application Network Management Electronic Payment CCTV Remote Working AI Trend Micro Be Proactive Touchscreen Business Intelligence Emergency Proxy Server Emails Digital Security Cameras Computer Malfunction Fake News Electronic Health Records Transportation Phone System Wasting Time Banking Securty Google Wallet Vendor Mangement Service Level Agreement Computing Infrastructure Samsung Device security eCommerce Messenger Modem Workplace Strategies Deep Learning Domains Management Uninterrupted Power Supply Wireless Headphones Videos Webcam Microsoft Excel Surveillance Managing Costs Business Metrics Tech Hosted Solution Business Mangement Going Green Business Cards Tablets Books SSID Error Bookmark Society Media Development Computer Accessories Employer/Employee Relationships Language Virtual Machine Google Calendar Term Public Speaking Download Supercomputer Piracy HTML Reviews Optimization Reading Streaming Media Smart Technology Monitors Virus Visible Light Communication Browsers Windows 8 Keyboard Nanotechnology 2FA Motion Sickness Teamwork Hypervisor Comparison Google Play Hard Drives Google Drive Upload Software License Data Storage intranet Shopping Relocation Medical IT Displays Social Network Advertising Work/Life Balance Wireless Knowledge Data Analysis Tech Support Shortcut Corporate Profile Screen Reader Paperless SQL Server Licensing Television Security Cameras Heating/Cooling Telephony Trends Environment Employer Employee Relationship Mobile Technology PCI DSS Social Networking Cabling Devices Gig Economy Troubleshooting Humor Windows XP Supply Chain Customer Resource management

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?