Australia is a sitting duck for ransomware attacks

Despite being a relatively new concept to the public, has roots in the late 1980s and has evolved significantly over the past decade, reaping billions of dollars in ill-gotten gains.

With names like Bad Rabbit, Chimera and GoldenEye, ransomware has established a mythical quality with an allure of mystery and fascination. Unless, of course, you are the target.

Victims have few options available to them; refusing to pay the ransom depends on having good enough backup practices to recover the corrupted or stolen data.

According to a study by security company Coveware, 51% of businesses surveyed were hit with some type of ransomware in 2020. More concerningly still, typical ransom demands are climbing dramatically, from an average of US$6,000 in 2018, to US$84,000 in 2019, and a staggering US$178,000 in 2020.

A brief history of ransomware

The first known example of ransomware dates back to 1988-89. Joseph Popp, a biologist, distributed floppy disks containing a survey (the "AIDS Information Introductory Diskette") to determine AIDS infection risks. Some 20,000 of them were reportedly distributed at a World Health Organization conference and via postal mailing lists. Unbeknown to those receiving the disks, it contained a virus of its own. The AIDS Trojan lay dormant on systems before locking users' files and demanding a "license fee" to restore access.

The 1989 AIDS Trojan (PC Cyborg) ransom demand. Credit: Joseph L. Popp, AIDS Information Trojan author, Public domain, via Wikimedia Commons

CryptoLocker ransom demand. Credit: Nikolai Grigorik, CC BY-SA 4.0 https://creativecommons.org/licenses/by-sa/4.0, via Wikimedia Commons

Wannacry ransom demand with integrated multi-language support. Screenshot of a WannaCry ransomware attack on Windows 8. Credit: Public domain, via Wikimedia Commons