recommended reading

A Rising Trend in Hacking: Locking Your Files and Charging You to Get Them Back

Nicescene/Shutterstock.com

Ransomware attacks, in which hackers hold hostage the files on their victims’ computers, are on the rise. A new report found that each quarter in 2016 saw a significant increase in the number of attacks:

“It would be inaccurate to say the threat landscape either diminished or expanded in 2016,” according to the report, which was released last week by SonicWall, a cybersecurity firm. “Rather, it appears to have evolved and shifted.”

The report identified 638.2 million unique ransomware attempts in 2016, up more than 16,000% from 3.8 million in 2015. The company used several methods to gather the numbers, including “honeypot” servers set up to detect attacks, and information from “more than 50 industry collaboration groups and research organizations.”

In a ransomware attack, the hackers gain access to the victim’s computer and encrypt its files. The hackers then charge the victim to decrypt the files, which only they can do.

Throughout 2016, ransomware attacks made news by forcing money out of private and public organizations, including a hospital in Los Angeles and the public transportation system in San Francisco. Once they’ve infected a system, hackers typically demand payment via anonymous bitcoin.

Date Incident Payment
February 2016 Hollywood Presbyterian Medical Center $17,000
April 2016 Lansing Board of Water & Light $25,000
September 2016 VESK cloud services $22,800
November 2016 San Francisco Transit Authority $73,000

These kinds of attacks appear to be a more direct route to hard cash than traditional malware, which is still the most common form of attack by far. And SonicWall discovered fewer new unique malware versions in 2016 (60 million) than it did in 2015 (64 million)–a decline of 6.3%.

Meanwhile, ransomware attacks show no signs of slowing in 2017. Hackers have so far demanded $35,000 from St. Louis libraries, an undisclosed amount from an Illinois police station, and wreaked havoc on 28,000 database servers, among other attacks.

By Keith Collins Quartz February 13, 2017

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

    Download
  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

    Download
  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

    Download
  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

    Download
  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.

    Download

When you download a report, your information may be shared with the underwriters of that document.