What More Can Ransomware Do In 2017, 2018 And Further

Ransomware is to grow further this year and in near future. It will be more aggressive than what the tech world has seen until now. It will include higher ransom payments and assume to even go beyond attacking data. It may shut down complete computer systems of factories or utilities.


If believed to United States Department of Homeland Security official Neil Jenkins, the ransomware has so far shown to be effective and there’s no reason for it to stop.

Experts at the recent RSA cybersecurity conference fear ransomware will spread and one estimate reveals in 2016 it has already raked in $1 billion.

The ransomware computer infections first targets data of victims and encrypt it. Once done, it threatens to be deleting the captured data unless a payment is made. Usually the cybercriminals in such cases have asked payments in bitcoin.


However, Jenkins pointed the ransomware would start targeting critical infrastructure citing the Austrian hotel attack that took out the keyword system of the hotel doors.

He added in future the ransomware cybercriminals could even try locking down control systems for a water utility too.

Jenkins said, “I worry that’s going to be the next step.”

Security Outliers CEO Gal Shpantzer said ransomware will infect and shut down entire operation of small businesses. It could injure people or lose lives too.

SentinelOne chief of security Jeremiah Grossman said ransomware is going to be worse and victims would not have any choice rather than to pay, that too in seven figures to recover the system.

He added hackers have started demanding higher payments and even more than $40,000 in one case.

Datto security provider CTO Robert Gibbons said ransomeware infections have started harassing small and medium sized business houses and a survey by his company discovered in 2016 about 60 percent of its partners experienced such attacks.

He added, “Ransomware is still an epidemic.”

Amid such era it is highly suggested to business houses to backup their data regularly and test those too ensuring whether they perfectly work.

Meanwhile, security vendors have also been publishing various to help free computers from such infections.

Gibbons further added one out of four times it has been seen the hackers didn’t decrypt data even after receiving payment. He strongly recommends not to be tempted to pay ransom to cybercriminals.

Leave a Reply

Your email address will not be published. Required fields are marked *