
In this case, Gleb, as our CEO, would be a reasonable person to receive such a document, if it were real.

The email above is likely to be what is known as spear phishing, meaning the attacker tailored the attack in some way towards the person or organization receiving the email. A good attack will look just like an email you could receive, whether at your business or at home. Phishing emails came to prominence in 2003 and have been a staple of attackers since then. Here’s an example below that our CEO received. One of the most common attack vectors is a phishing email. This is a never-ending job, but there are ways you can help. Anti-virus vendors are in a constant battle with these hackers, trying to stop the malware they create from being successfully downloaded and installed on your computer. For example, Java and Adobe-based vulnerabilities are often utilized to create exploits that can be used by ransomware builders. There are several different ways for malware to get on a computer. Attack Vectors: How Do You Get Infected in the First Place? On the bright side, according to security experts, nearly everyone who made the proper payment had their files decrypted. The “cost” to recover the files encrypted by Locker was 0.1 Bitcoins (about $24 USD), a modest amount when compared with previous ransomware attacks that demanded five to 10 times as much to recover the files they encrypted. For this reason it was difficult to pin down the attack vector, although a compromised Minecraft installer was suspected. The malware could have been installed anytime in the previous weeks, while it waited to be activated. Locker was unusual in that it was “sleeper” ransomware, having been dormant on the infected systems and devices until May 25 th. It wasn’t until 2013 with the introduction of Cryptolocker and its subsequent variants and copycats, that ransomware became widely known.

The creator was eventually caught and the ransomware genre went underground for several years, though it reappeared briefly in 20. An infected computer would display a message to the user that one of their programs had expired and they needed to pay $189 to have it restored.

The first known ransomware attack was in 1989 using the AIDS Trojan/PC Borg malware.
