BACK IN the ‘good old days', before Google* spied on everything you did online and Microsoft did likewise on your desktop PC, malware was largely an irritant.
Word Macro viruses were annoying, but not terminal, and most of the rest just did pesky things like calling you an idiot and emailing all your friends to prove it.
Sure, there were some nasties about. The first encrypting ransomware went by the name of 'AIDS'** and was written in 1989 by Dr Joseph Popp, who was declared mentally unfit to stand trial.
However, it wasn't especially effective, nor was the floppy disk an especially effective medium for propagating it. The use of symmetric cryptography also rendered it somewhat ineffective as the decryption key could be extracted from the malware code.
Researchers Adam Young and Moti Yung introduced the idea of using public-key cryptography in 1996, and some form of electronic money was the ransom currency of choice.
This is probably why it wasn't until 2013 that the latest genre of ransomware emerged, after bitcoin had become firmly established.
Ransomware has evolved fast since 2013, and the number of attacks quintupled during 2016 alone. So which are the nastiest of this new strain of malware?
This is the ransomware that showed all the other cyber toe rags how to do it in 2013. The malware propagates via infected email attachments, encrypting particular classes of files stored locally and on mounted network drives using RSA public-key cryptography. The private key is stored on the malware's control servers, to which it connects when activated.
The malware displays a message offering decryption of the data if payment is made by a particular deadline, alongside a threat that the decryption key will be deleted if the user doesn't cough up in time. CryptoLocker can be removed, but the encrypted files will stay resolutely encrypted.
The Gameover ZeuS botnet network used to run CryptoLocker was taken down in an international operation in 2014 and the crypto analysed. As a result, an online tool is available to recover files encrypted under CryptoLocker. The scammers, however, laughed all the way to bank as they still got away with some $3m.
CryptoLocker spawned a number of imitations, including unpleasant clones such as CryptoWall and TorrentLocker. Above all, it provided the proof-of-concept for malware writers and other online ne'er do wells, who haven't looked back since.
* It's fair to assume that GCHQ and the NSA have always been doing this
** Dr Popp was a Harvard-trained anthropologist and consultant with the World Health Organisation in Kenya. He claimed that all the proceeds from the ransomware were being donated to research into HIV and AIDS.
It's the week in Google
You can probably guess which
GPU is available in Blighty now for £260
Move could bring Halo and Gears of War to the hybrid console