{"id":2312,"date":"2021-09-19T13:08:42","date_gmt":"2021-09-19T13:08:42","guid":{"rendered":"https:\/\/osintme.com\/?p=2312"},"modified":"2021-09-19T13:11:38","modified_gmt":"2021-09-19T13:11:38","slug":"the-evolution-of-ransomware","status":"publish","type":"post","link":"https:\/\/osintme.com\/index.php\/2021\/09\/19\/the-evolution-of-ransomware\/","title":{"rendered":"The evolution of ransomware"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2312\" class=\"elementor elementor-2312\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-caa1f7b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"caa1f7b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-617ebef\" data-id=\"617ebef\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-608c659 elementor-widget elementor-widget-text-editor\" data-id=\"608c659\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This week I&#8217;m presenting my article published in <a href=\"https:\/\/ipaireland.org\/wp-content\/uploads\/2021\/09\/IPA_Autumn2021.pdf\">Issue 50 of the IPA Journal<\/a> &#8211; a quarterly magazine (comes out online and as a physical copy) by the Irish Section of the International Police Association.<\/p><p>Here it comes:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8ec45a1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8ec45a1\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-fdbacd2\" data-id=\"fdbacd2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-80d573e elementor-widget elementor-widget-heading\" data-id=\"80d573e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">The history and evolution of ransomware: from vouchers to cryptocurrency<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f87eb96 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f87eb96\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f6eec38\" data-id=\"f6eec38\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-af8a1f4 elementor-widget elementor-widget-text-editor\" data-id=\"af8a1f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>If you have followed the news broadcasts or social media postings over the last few months, then you couldn\u2019t have missed the major news story about what was probably the most serious cyber-attack that was ever perpetrated against this state &#8211; the Conti ransomware infection of the HSE computer networks last may.<\/p><p>It was also one of the biggest cybersecurity-related news stories in Europe so far this year, generating numerous national and international debates. Here at home, some of those debates centred on whether the state should or should not pay off the cybercriminals. That cyber-attack also brought into sharp focus the adequacy of Ireland\u2019s cyber defence capabilities.<\/p><p>The topic of ransomware was new to some people, but this attack vector against IT systems is now decades old. So &#8211; what exactly is ransomware and how did it come about?<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0d9bc7b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0d9bc7b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6c64c3a\" data-id=\"6c64c3a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cfd37d5 elementor-widget elementor-widget-image\" data-id=\"cfd37d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"292\" height=\"226\" src=\"https:\/\/i0.wp.com\/osintme.com\/wp-content\/uploads\/2021\/09\/Screenshot-2021-09-19-at-13.21.24.png?fit=292%2C226&amp;ssl=1\" class=\"attachment-large size-large wp-image-2317\" alt=\"ransomware OSINT\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cf828de elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cf828de\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b594eac\" data-id=\"b594eac\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ae49b7a elementor-widget elementor-widget-text-editor\" data-id=\"ae49b7a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>DEFINITION OF RANSOMWARE<\/strong><\/p><p>Ransomware (or \u201cransom software\u201d) is a computer program designed to apply a rogue encryption algorithm to files on a hard drive, making accessing those files impossible to their legitimate owner, unless a ransom is paid in exchange for a decryption key.<\/p><p>The first documented case of a ransomware attack happened years before the Internet began taking its modern shape. In 1989, attendees of the World Health Organisation\u2019s AIDS conference were handed out floppy disks (who remembers those nowadays!) that contained a malicious program.<\/p><p>That program, later referred to as the AIDS trojan, copied itself onto the hard drive, stayed dormant for a while and then unexpectedly locked the C drive system files. Unlocking them required sending $189 to a P.O. box in Panama.<\/p><p>It turned out that the person behind this attack was a Harvard educated biologist, whose motives ultimately remained unclear &#8211; he was identified and arrested but was later declared mentally unfit to stand trial.<\/p><p>Despite its novelty, the AIDS trojan was considered basic software that used pretty simple cryptography, which was eventually cracked making it possible to unlock any affected files without paying the extortionist.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-97ce1c7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"97ce1c7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-af27842\" data-id=\"af27842\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ed32d5a elementor-widget elementor-widget-text-editor\" data-id=\"ed32d5a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>THE EVOLVING THREAT<\/strong><\/p><p>In the following years, through the expansion of the Internet, ransomware evolved so that it could proliferate between computers using network protocols &#8211; no more need for handing out floppy disks or physical media. It kept its \u201ctrojan\u201d characteristic though &#8211; like the mythical Trojan horse, ransomware would masquerade as benign, or even useful, legitimate software.<\/p><p>In 2005, PGPCoder &#8211; a trojan that used a more complex encryption, accompanied by a text file demanding ransom payable through the early e-commerce platform, Liberty Reserve hit its first victims. A year later came the Archiveus trojan with its unusual system for ransom payment &#8211; through making a purchase at an online pharmacy.<\/p><p>Then came other forms of ransomware, some more primitive than others, that would lock the user\u2019s screen with a malicious pop-up and demand payment through Ukash cards, PayPal deposits or even Amazon vouchers.<\/p><p>Some researchers class this type of software as \u201cscareware\u201d &#8211; in some cases it was relatively easy to bypass its locking mechanism by booting the system up into safe mode or restoring it without the loss of any data.<\/p><p>Irish users saw their fair share of these attacks in the form of the \u201cGarda Ukash virus\u201d, which attempted to scare them into paying \u201ca fine\u201d for accessing illegal content.<\/p><p>All of the above modes of operation highlighted one critical issue for the ransomware operators: the limited ability to extort and process payments through third party services, who were not sympathetic to their criminal cause. This would soon change, with the growing popularity of Bitcoin and other cryptocurrencies.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f26e44c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f26e44c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a91bb62\" data-id=\"a91bb62\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d1c7371 elementor-widget elementor-widget-image\" data-id=\"d1c7371\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"962\" height=\"570\" src=\"https:\/\/i0.wp.com\/osintme.com\/wp-content\/uploads\/2021\/09\/Screenshot-2021-09-19-at-13.50.38.png?fit=962%2C570&amp;ssl=1\" class=\"attachment-large size-large wp-image-2318\" alt=\"Ukash Garda virus scareware\" srcset=\"https:\/\/i0.wp.com\/osintme.com\/wp-content\/uploads\/2021\/09\/Screenshot-2021-09-19-at-13.50.38.png?w=962&amp;ssl=1 962w, https:\/\/i0.wp.com\/osintme.com\/wp-content\/uploads\/2021\/09\/Screenshot-2021-09-19-at-13.50.38.png?resize=300%2C178&amp;ssl=1 300w, https:\/\/i0.wp.com\/osintme.com\/wp-content\/uploads\/2021\/09\/Screenshot-2021-09-19-at-13.50.38.png?resize=768%2C455&amp;ssl=1 768w\" sizes=\"(max-width: 962px) 100vw, 962px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Example of a 2012 vintage scareware pop up screen<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d257bb7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d257bb7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5917f92\" data-id=\"5917f92\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5f8415a elementor-widget elementor-widget-text-editor\" data-id=\"5f8415a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>NEW DECADE, NEW TRENDS<\/strong><\/p><p>Between 2011 and 2012 an observable trend began to form, which saw an increased reliance by cybercriminals and their extortive software on Bitcoin &#8211; a decentralised, censorship resistant digital currency of the Internet. Bitcoin allows its holder to be their own financial custodian, who can freely transact with other users without relying on any intermediaries (although exchanging Bitcoin for a fiat currency still requires a third-party service).<\/p><p>The ransomware operators also upped their technical game &#8211; for example, the infamous CryptoLocker or TeslaCrypt that began mass-attacking networks in 2013, relied on huge \u2018botnets\u2019 &#8211; a network made up of thousands of malware infected computers that can be used to spread spam or malware, as well as conduct denial of service attacks on online systems anywhere in the world. Botnets allowed ransomware operators conduct massive organised campaigns, in which they sent hundreds of thousands of malicious emails and links used to proliferate their malicious software.<\/p><p>The emergence of botnets and a properly organised and maintained attack infrastructure led to the development of the \u201cransomware as a service\u201d (RaaS) modus operandi for the ransom software developers. This quasi-business model somewhat mirrors the services offered by global big tech entities &#8211; for a monthly subscription fee in the region of $50 &#8211; $100, a less technically sophisticated cybercriminal can purchase a ready-togo ransomware kit, along with access to dedicated training materials, online forums or botnets for hire.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6dccc2c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6dccc2c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a5996f4\" data-id=\"a5996f4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4ae82b0 elementor-widget elementor-widget-text-editor\" data-id=\"4ae82b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>A GLOBAL PROBLEM <\/strong><\/p><p>Another significant milestone for ransomware was WannaCry &#8211; the first global ransomware epidemic, which took place in early 2017. WannaCry targeted outdated and unpatched Windows systems all around the world, attacking anything from individual users to institutions, or even parts of traditional infrastructures &#8211; such as traffic lights systems, air conditioning controllers or hospital and maintenance equipment.<\/p><p>The biggest difference between WannaCry and the previous iterations of ransomware was its ability to automatically seek out vulnerable systems and replicate itself onto them. The attack itself lasted only for a few days, but it had dire ramifications \u2013 worldwide, several hundred thousand computer systems were infected, a lot of which were not even officially reported. Ever since WannaCry, ransomware has remained a global threat, yet it would change modus operandi once again.<\/p><p>Current ransomware campaigns are heavily targeted against those corporations and large institutions that cyber criminals identify as lucrative and likely to pay the ransom. Conti, REvil, Maze, Lockbit and several other nefarious actors engage in what the cybersecurity research company Crowdstrike describes as \u201cbig game hunting\u201d.<\/p><p>They go after targets that have a lot to lose in terms of their services downtime and reputational damage, therefore they might pay not only to obtain a decryption key, but also to prevent their data from being exfiltrated into the public domain. This tactic is called double extortion &#8211; ransom payment is demanded not only for unlocking the data, but also for not leaking it.<\/p><p>Companies that pay the ransom often calculate their losses and choose the lesser evil, especially in the light of potentially significant fines for noncompliance with the GDPR.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b55a3ad elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b55a3ad\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2566e99\" data-id=\"2566e99\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b890d25 elementor-widget elementor-widget-image\" data-id=\"b890d25\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1024\" height=\"370\" src=\"https:\/\/i0.wp.com\/osintme.com\/wp-content\/uploads\/2021\/09\/Screenshot-2021-09-19-at-13.59.55.png?fit=1024%2C370&amp;ssl=1\" class=\"attachment-large size-large wp-image-2319\" alt=\"Conti ransomware note\" srcset=\"https:\/\/i0.wp.com\/osintme.com\/wp-content\/uploads\/2021\/09\/Screenshot-2021-09-19-at-13.59.55.png?w=1089&amp;ssl=1 1089w, https:\/\/i0.wp.com\/osintme.com\/wp-content\/uploads\/2021\/09\/Screenshot-2021-09-19-at-13.59.55.png?resize=300%2C109&amp;ssl=1 300w, https:\/\/i0.wp.com\/osintme.com\/wp-content\/uploads\/2021\/09\/Screenshot-2021-09-19-at-13.59.55.png?resize=1024%2C370&amp;ssl=1 1024w, https:\/\/i0.wp.com\/osintme.com\/wp-content\/uploads\/2021\/09\/Screenshot-2021-09-19-at-13.59.55.png?resize=768%2C278&amp;ssl=1 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Screenshot from a Conti ransomware \"recovery service\" site<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7584b0d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7584b0d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6e159cf\" data-id=\"6e159cf\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4a395ca elementor-widget elementor-widget-text-editor\" data-id=\"4a395ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>RANSOMWARE AS CYBER TERRORISM <\/strong><\/p><p>There are many signs to suggest that ransomware attacks might soon be treated on par with acts of terrorism, especially if they result in massive disruptions and losses of human life.<\/p><p>This year alone there were several cases of medical patients dying due to ransomware attacks on hospitals and medical facilities all over the world.<\/p><p>The HSE attack could easily be considered an act of cyber terrorism, same as the crippling attack on the US Colonial Pipeline, which resulted in huge delays in fuel distribution. When state services or critical infrastructure cannot function as a result of a cyber-attack, we are no longer talking about regular, profit-driven criminal activity.<\/p><p>One thing is certain &#8211; matters will unfortunately get worse before they get better. Ransomware gangs will continue to operate as long as they are harboured by pariah States and as long as there is no coordinated, global response against them.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The history and evolution of ransomware: from vouchers to cryptocurrency\u200b. Article originally published in the IPA Journal.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[18],"tags":[62,65,76,101,135,61,134,15],"class_list":["post-2312","post","type-post","status-publish","format-standard","hentry","category-digital-privacy-security","tag-bitcoin","tag-cryptocurrency","tag-cybercrime","tag-encryption","tag-hse","tag-malware","tag-ransomware","tag-security"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/posts\/2312","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/comments?post=2312"}],"version-history":[{"count":22,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/posts\/2312\/revisions"}],"predecessor-version":[{"id":2337,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/posts\/2312\/revisions\/2337"}],"wp:attachment":[{"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/media?parent=2312"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/categories?post=2312"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/tags?post=2312"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}