Computer Security April 2016 was the Worst Month for Ransomware on Record...

April 2016 was the Worst Month for Ransomware on Record in the US

ransomware april 2016 worst monthRansomware in the US made up a bigger chunk of such threats in April than any other month on record. That's according to data released today by ESG, makers of the anti-malware program SpyHunter.

The experts at ESG looked at more than 65 million malware infections detected by its software in the US since April 2013. They found that ransomware in April 2016 more than doubled the total from March 2016. Additionally, ransomware made up a larger percentage of overall infections in April than in any other month in the last three years.

Generally, ransomware infections threaten computer users with the destruction of data through encryption if they don't pay a ransom to the crooks who created the infections. Several high profile cases of ransomware have made national and international headlines in the last few weeks as infections have hit hospitals, school districts, and other governmental offices.

"It's not just businesses that are being hit by ransomware," said ESG spokesperson Ryan Gerding. "Every day thousands and thousands of people turn on their personal computers only to find their most precious photos and other files have been locked up by bad guys."

ESG reports that after staying steady for the last six months of 2015, the number of ransomware detected by SpyHunter began to climb steeply in 2016. February saw a 19.37% increase over January. March had a 9.46% increase over February. Now, April infections have more than doubled those in March with an astonishing spike of 158.87%, the third biggest month-to-month spike on record. To add insult to injury, the percentage of overall infections that were ransomware is the highest by far of any other month in the last three years.

"Cyber criminals tend to go with what works, and in this case the threat of losing valuable photos and other documents forever is enough to make some people pay the ransom," Gerding says. "The more people give in to the demands, the more encouraged the ransomware makers become."

Best Defense Against Ransomware

  1. Regularly backup your data to an external device or to the cloud. That way, if you do get a ransomware infection, you can simply restore your data to the last time you saved it rather than paying the ransom or losing the files altogether. Ultimately, by having a backup of your system's hard drive, you avoid putting yourself and your computer's data at an unnecessary risk of being lost forever due to the utter destruction of ransomware.
  2. Update your software. Make sure all of your operating system and anti-virus/anti-malware programs are set to update automatically.
  3. Think before you click an unknown link. Almost all of the ransomware infections attacking individual computers are a result of someone getting tricked into clicking on a link from either in a bogus email, a hijacked social media account, or another malicious source over the Internet.

The experts at ESG point out that while the threat of ransomware is growing, it makes up just a tiny fraction of the types of infections that plague computers across the US on a daily basis. In fact, for every single ransomware infection detected by ESG's SpyHunter in April, there were 133 non-ransomware infections. Those infections range from rogue anti-spyware programs that steal money by pretending to be legitimate anti-spyware programs, to adware that hijacks web browsers. The good news with those infections is that they can be removed after the fact with good anti-malware programs (like SpyHunter).

1 Comment

I have noticed several times a browser windows flash the following in the address line, is this possibly how they do the encryption?

data:text/html;base64,PGh0bWw+PGJvZHk+PHNjcmlwdD52YXIgZXBvY2ggPSBuZXcgRGF0ZSgpLmdldFRpbWUoKTt2YXIgX2Vwb2NoRnJvbVdpbmRvd05hbWUgPSB3aW5kb3cubmFtZS5zcGxpdCgnXycpWzNdO2lmKGVwb2NoIC0gX2Vwb2NoRnJvbVdpbmRvd05hbWUgPCAyNTApe3dpbmRvdy5sb2NhdGlvbj0nJzt9PC9zY3JpcHQ+PC9ib2R5PjwvaHRtbD4=

Loading...