Ransomware Can Hold You Hostage And Devastate Your World
The Malaysian Women\'s Weekly|June 2017

You fire up your laptop and discover a sinister message: “We’ve encrypted your files! Pay us US$500 or we’ll destroy them all!”

Ellen Whyte

You may think it’s a joke but when you try to access your system, you find your files are complete gobbledygook or that you’re locked out.

Ransomware, programmes that break into your computer system and take your data hostage, is now one of the most pervasive and popular cyber crimes. In the USA, the Justice Department has noted over 4,000 of these attacks occurring every day since the beginning of 2016.

SHOCKING FACTS

In February 2016, Hollywood Presbyterian Medical Center paid a whopping US$17,000 to hackers to get back control of their computer system.

In June 2016 the University of Calgary paid a ransom of US$20,000 to get back their email database.

The FBI reported that ransomware cost businesses US$209 million in the first three months of 2016. Others say it could very well exceed US$1 billion in 2017.

CyberSecurity Malaysia, the national cyber security specialist agency under the Ministry of Science, Technology and Innovation (MOSTI), received 105 incident reports of ransomware in 2015. However, as many people don’t know how to report this, the figure is probably the tip of the iceberg.

According to Symantec’s Internet Security Threat Report 21 (ISTR21), Malaysia ranks 12th in the Asia Pacific and Japan region in terms of ransomware attacks.

“We recorded a total of 5,069 attacks in 2015,” says Chee Choon Hong, Director for Asia Consumer Business, Norton by Symantec. “The average ransom amount discovered to date in 2016 stands at US$679 – up from $294 in 2015 globally. The steady rise in ransom demands indicates that attackers may think there is more to be squeezed from victims.”

If you think this affects only large companies or businesses dealing in very valuable information, think again.

“Big organisations are difficult to penetrate, so hackers are targeting vendors and contractors in order to try and push their malware into the ‘mother ship’, ” notes Khoo Li Jing, consultant trainer from Avantus, a training company in Singapore that specialises in computer-security protection courses. “The final victims are still the small- and medium sized vendors and contractors because they need to bear the cost for system downtime and recovery.”

“We’ve been hit twice,” a chief technical officer of a Malaysian software services company admits ruefully on the condition of anonymity. “In both cases, they targeted the accounts department. The attack came via an email attachment. Our virus scanners failed to identify them due to their being an unknown new threat.”

HOW IT WORKS

Continue reading your story on the app

Continue reading your story in the magazine

MORE STORIES FROM THE MALAYSIAN WOMEN\'S WEEKLYView All

Shiny, Happy Sheila

Cover girl Sheila Sim knows a thing or two about living life to the fullest. The star shares her get-happy formula with us

5 mins read
The Malaysian Women's Weekly
February/March 2020

Adventure With A Cause

Some of us may know her as the lady behind one of the most successful premium laser treatment centres in town, but away from work, Erin Sandral thrives on adventure and seeks to improve the lives of underprivileged women

4 mins read
The Malaysian Women's Weekly
February/March 2020

It's Time For South Africa

A country once mired in decades of violent social struggle brought about by racial segregation policies and laws, it has gone through a rebirth and is flourishing like never before

5 mins read
The Malaysian Women's Weekly
February/March 2020

Know Your Children's Friends

Want to know what makes your child tick? Take a look at their circle of friends – they can offer a surprising insight into your child’s behaviour

6 mins read
The Malaysian Women's Weekly
February/March 2020

Why Women Devour Erotic Fiction

Women who read erotic fiction have better sex lives than women who don’t. We look at why turning pages can also help turn you on and discover why women are so aroused by erotic literature in all its forms

6 mins read
The Malaysian Women's Weekly
February/March 2020

Can Sleeping Apart Mend Your Marriage?

More and more couples choose to sleep in separate beds, but this growing trend doesn’t mean the end of a loving relationship

8 mins read
The Malaysian Women's Weekly
February/March 2020

Can Superstition Enhance Your Life?

The power of positive thinking and a belief in lucky charms might be all it takes to turn your fortunes around

4 mins read
The Malaysian Women's Weekly
February/March 2020

We Wish You A Pleasant Flight

Other than tense muscles, dehydration and sleeplessness, air travel can affect our bodies in many other ways – here’s what you need to know

3 mins read
The Malaysian Women's Weekly
December - January 2019

Prosperous Delights

Tasty treats during Chinese New Year is all part of the festivities to spread joy and good luck. We asked Assistant Pastry Chef Yap Wai Keong from One World Hotel Petaling Jaya to share with us a few auspicious recipes that will bring happiness to your loved ones.

3 mins read
The Malaysian Women's Weekly
December - January 2019

Passion For Cooking And Storytelling

Chef, restaurateur, author and TV host Sapna Anand has a mission – to show the world that Indian cuisine is not limited to just briyani rice or chicken varuval.

6 mins read
The Malaysian Women's Weekly
December - January 2019
RELATED STORIES

These Researchers Want To Save You From Ransomware—For Free

If your PC is ever locked by ransomware, paying up won’t necessarily release your files; in fact, we recommend that you never hand over cash to these scammers.

5 mins read
PC Magazine
November 2019

Is Cyber War Inevitable?

Nation-states around the globe are well aware that their foes are one extended power outage, ransomware crisis, or data dump away from chaos.

10+ mins read
PC Magazine
September 2019

N. Korea Calls Sony, Wannacry Hack Charges Smear Campaign

North Korea strongly denied claims by the United States that a computer programmer working for the North Korean government was involved in the hack of Sony Pictures Entertainment and the spread of the WannaCry ransomware virus.

2 mins read
Techlife News
September 23, 2018

How Ransomware Conquered the World

Ransomware can hit anyone, but hackers are increasingly targeting people who are more willing to pay up. 

10+ mins read
PC Magazine
May 2016

20/20 Hindsight Shows That Foresight Is Never 20/20

’Tis the season…No, we’re not talking about the holidays — Thanksgiving, Hanukkah, Kwanzaa, Christmas, and others. In the world of cyber, ’tis the season for speculation.

5 mins read
HWM Singapore
January 2021

5 Key Security Tech Trends That Must Be At The Heart Of Every Organization's Security Strategy In 2021

2020 witnessed the threat landscape in India changing and evolving quickly, data breaches, ransomware attacks, privacy failures, and other cybersecurity challenges are now on everyone’s radar screen more than ever. Yet most businesses still struggled with effectively preparing for them.

3 mins read
Apps Unveiled
December 2020

Working In The New Norm?

The COVID-19 pandemic has had a dramatic effect on virtually every aspect of our lives. The way we live and work has been transformed beyond recognition. To put it simply - Life on earth has gone online. This change wasn’t gradual, it happened virtually overnight. Businesses around the world have had to adapt at the speed of light, making significant infrastructure changes. While companies rush to have their employees work from home, IT and security teams have been forced to adapt to the new normal and race to secure the evolving attack surface. In the meantime, threat actors have been taking advantage of this situation, evolving their skills and methodologies to exploit the vulnerabilities of this new hybrid world.

4 mins read
HWM Singapore
November 2020

What's The Best Way To Prevent Ransomware Attacks?

Experts across the board agree: The best way to prevent ransomware attacks is to take a multi-layered approach. Since the first phase in a ransomware attack almost always involves social engineering, employee cyber security training is a good place to start. But if attackers get in, you’ll need to be able to recover from an attack. Make regular offline backups (and practice restoring them) so you can get back to business quickly.

2 mins read
SME Magazine Singapore
September 2019

Should You Pay Up?

Alexandra Cain investigates whether or not you should negotiate with criminals in a ransomware attack.

4 mins read
The CEO Magazine Asia
May 2019

7 Cyber Security Threats for 2016

From ransomware to sextortion to the security of IoT devices, cyber security will continue to be a mainstream topic in 2016. Life-saving devices like pacemakers or insulin pumps can also get hacked.

3 mins read
DataQuest
January 31, 2016