What is Ransomware?
Ransomware is a type of malware used by cybercriminals. If a computer or network has been infected with ransomware, the ransomware blocks the access to the system or encrypts its data. Cybercriminals demand ransom money from their victims in exchange for releasing the data.
Ransomware is on the rise.
Cybersecurity Ventures predicts that by 2031, ransomware will cost victims $265 billion annually, up from $20 billion in 2021, and it will attack one business every 2 seconds, up from every 11 seconds in 2021.
66 percent of surveyed organizations say they were hit by ransomware in the last year.
IBM Cost of a Data Breach Report 2023 finds that the global average cost of a data breach is $4.45 million.
Types of Ransomware
There are several types of ransomware attacks but most common attacks are these two:
Locker ransomware.
This type of malware blocks basic computer functions. For example, you may be denied access to the desktop, while the mouse and keyboard are partially disabled. This allows you to continue to interact with the window containing the ransom demand in order to make the payment.
Apart from that, the computer is inoperable. But there is good news: Locker malware doesn't usually target critical files; it generally just wants to lock you out. Complete destruction of your data is therefore unlikely.
Crypto ransomware.
The aim of crypto ransomware is to encrypt your important data such as documents, pictures and videos, but not to interfere with basic computer functions. This spreads panic because users can see their files but cannot access them.
Crypto developers often add a countdown to their ransom demand: "If you don't pay the ransom by the deadline, all your files will be deleted." and due to the number of users who are unaware of the need for backups in the cloud or on external physical storage devices, crypto ransomware can have a devastating impact.
Consequently, many victims pay the ransom simply to get their files back.
7 Steps to Help Prevent & Limit the Impact of Ransomware
Ransomware attacks are widespread and harmful. They lock your data and demand a ransom. Here are seven steps to protect against them:
1. Backup Your Data Securely
Create backups of important data.
Store them offline or in the cloud.
Test backups to ensure they're clean.
2. Develop Plans and Policies
Make an incident response plan.
Define roles and communication during attacks.
Establish a suspicious email policy.
3. Review Port Settings
Consider closing unused ports.
Limit connections to trusted hosts.
Review settings for on-premises and cloud environments.
4. Harden Your Endpoints
Configure systems securely.
Reduce security gaps with CIS Benchmarks.
5. Keep Systems Updated
Regularly update operating systems and software.
Enable auto-updates for security patches.
6. Train Your Team
Provide security awareness training.
Teach employees to spot malicious emails.
7. Implement an IDS (Intrusion Detection System)
Use IDS to detect malicious activity in network traffic.
Ensure IDS signatures are updated regularly.
Consider using Albert Network Monitoring for SLTT organizations.
How to Protect Against Ransomware With a 3-2-1-1 Strategy
3: Store 3 copies of data — 1 original plus 2 backups.
2: Store data on at least 2 types of storage media.
1: Store 1 copy of data remotely.
1: Store 1 copy of data in an air-gap isolation zone.
Three Copies of Data: First and foremost, make three copies of your data. This ensures that you have multiple backups at your disposal, so even if one becomes compromised, you still have two others as a safety net.
Two Different Media Types: Store your backups on two separate media types. For example, use both cloud storage and external hard drives. Please don't consider the combination of an internal disk and a USB disk to be different media types. A USB drive is just as vulnerable as the internal disks. Multiple disk-based copies are only using one type of media. Consider Cloud and Tape solutions for the second backup media.
One Copy of Data in an Off-site Location or Remotely: Keep one of your backups off-site. This means that even if your primary location falls victim to a ransomware attack or other disaster, your data remains safe and accessible. Consider using a secure, remote backup service for optimal protection.
One Air-Gapped Backup OR one copy of backup stored on Immutable Media: One backup copy of your data must be immutable. Immutable backups are saved in a write-once-read-many-times (WORM) format that can’t be altered or deleted, even by hackers or admins.
11 Biggest Ransomware Attacks in History
1. ExPetr / NotPetya
Year: 2017
Attack Type: Ransomware (wiper)
Notable Targets: Maersk and Merck
Estimated Damage: $10 billion
Key Detail: Exploited an SMB vulnerability, designed for destruction.
2. WannaCry
Year: 2017
Attack Type: Ransomware (SMB vulnerability)
Notable Targets: Global attack
Estimated Damage: $4 billion
Key Detail: Used EternalBlue, affected 200,000+ computers.
3. GandCrab
Year: 2018-2019
Attack Type: Ransomware-as-a-service (RaaS)
Estimated Extortion: Over $2 billion
Key Detail: Ransomware sold to affiliates, primarily spread through phishing and exploit kits.
4. Locky
Year: 2016-2018
Attack Type: Ransomware (phishing emails)
Estimated Damage: $1 billion
Key Detail: Delivered via malicious Word documents, targeted healthcare providers.
5. Ryuk
Year: 2018-present
Attack Type: Ransomware (usually via TrickBot)
Estimated Extortion: Over $150 million
Key Detail: Manually deployed, extensive network compromise before encryption.
6. REvil/Sodinokibi
Year: 2019-2021
Attack Type: Ransomware (exploited vulnerabilities)
Notable Targets: Kaseya, JBS
Key Detail: Known for double extortion, attacked Kaseya supply-chain.
7. DoppelPaymer
Year: 2019-present
Attack Type: Ransomware (spear-phishing)
Estimated Damage: Tens of millions
Key Detail: Manually delivered, uses multi-threading for faster encryption.
8. SamSam
Year: 2016-2018
Attack Type: Ransomware (manual deployment)
Estimated Damage: Over $6 million in ransom payments
Key Detail: Manually deployed, targeted healthcare and government sectors.
9. NetWalker/UCSF
Year: 2020
Attack Type: Ransomware (phishing, VPN vulnerabilities)
Notable Target: University of California, San Francisco (UCSF)
Estimated Damage: Tens of millions, $1.14 million ransom from UCSF.
10. Colonial Pipeline
Year: 2021
Attack Type: Ransomware (phishing, VPN exploitation)
Target: Colonial Pipeline
Ransom Paid: $4.4 million in Bitcoin
Key Detail: Largest publicized cyber-attack on US critical infrastructure.
11. CryptoLocker
Year: 2013-2014
Attack Type: Ransomware (Trojan Horse)
Estimated Damage: Approximately $3 million in ransom payments
Key Detail: Used advanced encryption, decentralized infrastructure.