For the very first time, ransomware was come into existence in the late year of the 1980s as PC Cyborg or AIDS. It encrypts all files and data in the C: directory after 90 reboots, later on, the hacker asked for the payment to the user to renew their license by sending $189 by email to PC Cyborg Corp. The encryption used was quite easy and it can be used again in near future hence it becomes a threat to all the computers at that time.
Almost for the 20years, there was no other form of ransomware came into the knowledge. In the year 2004, GpCode used an RSA encryption to hold the personal files for ransom.
In the year 2007, a new type of ransomware came known as WinLock heralded. It was different from the encrypting files. It started locking the devices of the persons. WinLock started taking command over the victim’s computer screen and displayed pornographic images. To unlock the screen, they demanded the payment via an SMS which was paid one.
With the time, there was the development of the ransom family Reveton, in the year 2012, a new form of ransomware: law enforcement ransomware came into the existence. In this, by default, the victim’s desktop got locked out and started displaying the page which looks like an original and official page contains the law enforcement agency’s credentials such as the Interpol and FBI. This was their way to make the victim feel guilty as if they had committed a crime like hacking the others computer, downloading illegal files and involved in pornography. These law enforcement agency’s asked for the fine amount and the fine amount was somewhere between from $100 to $3,000 with a pre-paid card like PaySafeCard and UKash. Most of the victims were not aware of this law enforcement ransomware act. They took it seriously and believed that they are going through the real investigation process. To get out of it and in order to save their prestige, they started paying the ransom amount.
In the year 2013, the biggest ransomware malware was re-introduced in form of CryptoLocker encrypting ransomware. These encrypting ransomware were known as WannaCry which was introduced in May 2017, and the other one was Petyain introduced on June 2017. This time it came as more dangerous for the devices. They used military-grade encryption and kept the key to unlock the devices on a remote server. It becomes almost impossible to get the data back anyhow and the last way was to pay the ransom to get all the data and files. This type of encrypting ransomware is still in use at present time. It has become a powerful tool for the hacker and the cybercriminals to make money and the best part is even they do not need to be an expert or IT professional to use these ransomware tools. It is next to impossible to save the devices from ransomware but by creating a strong backup and recovery plan, it will become easy to prevent all the files and data.