{"id":11240,"date":"2018-06-04T12:25:32","date_gmt":"2018-06-04T08:25:32","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/evolution-of-ransomware\/11240\/"},"modified":"2019-11-15T15:23:05","modified_gmt":"2019-11-15T11:23:05","slug":"evolution-of-ransomware","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/evolution-of-ransomware\/11240\/","title":{"rendered":"The evolution of ransomware \u2014 and the tools to combat it"},"content":{"rendered":"<p>The past year of headlining ransomware is a result of what we can describe only \u00a0as an evolutionary leap. Serious-minded cybercriminals have transformed the once-simple file encryption threat into a fairly intricate tool \u2014 and all signs point to the evolutionary trend continuing.<\/p>\n<h2>Pre-2017<\/h2>\n<p>In the \u201cgood old\u201d days, ransomware victims were predominantly casual bystanders. Cybercriminals slung spam far and wide, hoping to find at least one user with important files on their computer who would open the malicious attachment.<\/p>\n<p>But the situation changed in 2016. Increasingly, spammers\u2019 random lists were replaced by addresses, specially harvested, of company employees found online. The perpetrators had clearly figured out that attacking businesses was more profitable. The message content changed accordingly as well: Instead of masquerading as personal correspondence, the messages now seemed to come from partners, customers, and tax services.<\/p>\n<h3>2017<\/h3>\n<p>In 2017, the situation changed again, this time radically. Two large-scale epidemics causing damage in the millions showed that ransomware could be used for purposes other than extortion. The first, the notorious <a href=\"https:\/\/www.kaspersky.com\/blog\/wannacry-for-b2b\/16544\/\" target=\"_blank\" rel=\"noopener nofollow\">WannaCry<\/a>, was a technological trailblazer. This ransomware exploited a vulnerability in the implementation of the SMB protocol in Windows. It was a vulnerability that had already been fixed, but many businesses just hadn\u2019t bothered to install the patch. But that wasn\u2019t the half of it.<\/p>\n<p>WannaCry was not successful as ransomware. Despite infecting hundreds of thousands of machines, WannaCry yielded only modest payoffs to its creators. Some researchers began to wonder whether the goal was money at all, or if it might instead be sabotage or data destruction.<\/p>\n<p>The next threat erased any doubts. <a href=\"https:\/\/www.kaspersky.com\/blog\/expetr-for-b2b\/17343\/\" target=\"_blank\" rel=\"noopener nofollow\">ExPetr<\/a> was not even capable of recovering encrypted data\u00a0\u2014 it was a <a href=\"https:\/\/securelist.com\/threats\/wiper-glossary\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener\">wiper<\/a> disguised as ransomware. Moreover, it employed a new piece of trickery. Using a supply-chain attack, the creators managed to compromise a piece of Ukrainian accounting software called MeDoc, exposing almost every company doing business in Ukraine to the risk of infection.<\/p>\n<h3>2018<\/h3>\n<p>Events so far this year show that ransomware is still evolving. Our experts recently investigated a fairly new threat, the latest modification of the <a href=\"https:\/\/www.kaspersky.com\/blog\/synack-ransomware-featured\/22323\/\" target=\"_blank\" rel=\"noopener nofollow\">SynAck<\/a> ransomware. It was found to contain complex mechanisms to counter protection technologies, signs of a targeted attack. The countering measures include:<\/p>\n<ul>\n<li>Applying a process duplication method known as Process Doppelg\u00e4nging to try to pass off a malicious process as legitimate;<\/li>\n<li>Obfuscating executable code before compilation;<\/li>\n<li>Checking to make sure that it\u2019s not being watched in a controlled environment;<\/li>\n<li>Shutting down processes and services to ensure access to important files;<\/li>\n<li>Clearing event logs to hinder post-incident analysis.<\/li>\n<\/ul>\n<p>There is no reason to believe that the evolution of ransomware is complete. Its creators will carry on looking for ways to enhance it.<\/p>\n<h2>How to stop ransomware\u2019s evolution<\/h2>\n<p>The only way to put an end to the development of ransomware is to render its attacks ineffective. And that requires the latest cutting-edge technologies. Our clients have long been safe and sound: All of our corporate endpoint solutions contain subsystems enabling us to effectively combat ransomware.<\/p>\n<p>But even if you don\u2019t use Kaspersky Lab\u2019s corporate solutions, that\u2019s no reason to leave data unprotected. Kaspersky Anti-Ransomware Tool, our dedicated solution, augments the security mechanisms of most third-party vendors. It uses the latest behavioral detection technologies to reveal ransomware, and it takes full advantage of our cloud-based tools. It, too, evolves to meet the challenge of modern threats\u00a0\u2014 we just released the third version.<\/p>\n<p>This latest version of Kaspersky Anti-Ransomware Tool can be deployed from the command line, facilitating its automated implementation in corporate networks. And if that weren\u2019t enough, the solution is totally free. Sign up, download, and install the application <a href=\"https:\/\/www.kaspersky.com\/blog\/kaspersky-anti-ransomware-tool-for-business\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=gl_kaspersky-anti-ransomware_organic&amp;utm_content=banner&amp;utm_term=gl_kdaily_organic_banner_blog_kaspersky-anti-ransomware\" target=\"_blank\" rel=\"noopener nofollow\">right here<\/a>.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kart\">\n","protected":false},"excerpt":{"rendered":"<p>For the last few years, ransomware has been evolving into a sophisticated cyberweapon. You need cutting-edge technologies to stop it.<\/p>\n","protected":false},"author":700,"featured_media":11241,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1917],"tags":[1314,1357,433,1770,1316],"class_list":{"0":"post-11240","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-encryptors","10":"tag-expetr","11":"tag-ransomware","12":"tag-synack","13":"tag-wannacry"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/evolution-of-ransomware\/11240\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/evolution-of-ransomware\/13450\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/evolution-of-ransomware\/15508\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/evolution-of-ransomware\/13796\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/evolution-of-ransomware\/13040\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/evolution-of-ransomware\/16275\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/evolution-of-ransomware\/4987\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/evolution-of-ransomware\/22516\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/evolution-of-ransomware\/10610\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/evolution-of-ransomware\/10434\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/evolution-of-ransomware\/9244\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/evolution-of-ransomware\/16919\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/evolution-of-ransomware\/23828\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/evolution-of-ransomware\/20382\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/evolution-of-ransomware\/20389\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/ransomware\/","name":"ransomware"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/11240","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/700"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=11240"}],"version-history":[{"count":2,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/11240\/revisions"}],"predecessor-version":[{"id":14676,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/11240\/revisions\/14676"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/11241"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=11240"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=11240"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=11240"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}