In case you’re not already familiar with it, “ransomware” is software that installs itself on your computer, scrambles your files so you can’t use them anymore, and then holds them ransom until you send money to the ransomer. (Via bitcoin, so (s)he cannot be identified.) Depending on who “sent” the software, sending the money may not get control of your computer back for you; some of the attackers are just scammers and don’t bother.
According to the FBI, this “business” is generating about $1B a year in economic activity. Some high-profile clients have fallen prey to it, like hospitals, universities, yes, even police departments.
It’s not going to get any better. Corporate IT departments think that running antivirus software (much of which is sold by companies that make and release viruses to hurt their competition,) making employees change passwords frequently, and making their systems difficult to use, is what security means. For most companies IT security is not a skill or a practice, it’s a to-do list executed by professional managers.
Ransomware is going to get worse because people with no computer skills (even less than that required to run IT!) can literally buy it and point it at an enemy now.
And then there’s this guy and his ideas about where the technology could go.
One of the characters knocking around in my head is an I.T. detective/forensic type, and the possible targets for a ransomware attack, why they are targets, and the kind of film noir mess my investigator could be walking into is a veritable gold mine.
Writing is turning out to be a great coping mechanism.
Did you enjoy this post? Did you find it useful? Sign up for my newsletter. There's more
content like this coming!