IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Industry must unite to protect against the increasing threat of ransomware

New report from Kaspersky Lab says anti-virus companies might be unable to deal with attacks that use ever-more sophisticated encryption algorithms

Anti-virus companies may soon find themselves powerless against hackers as Ransomware evolves into an even greater threat.

The use of asymmetric encryption in malicious programs dubbed ransomware to take over user data may continue to grow beyond the capability of current cryptography, according to a study by security expert Kaspersky Labs.

Ransomware is a type of malware used to encrypt data and hold it ransom for recovery. This type of threat, also know as blackmailing viruses due to their nature, has been around for a number of years. But in 2006, they reached a new level of sophistication in the form of Gpcode.ac, which took advantage of the RSA algorithm to create a 56 bit key.

This first attack was relatively easy for anti-virus companies to crack, so in June a new strain of the virus appeared where a 260 bit key was used. This was soon followed by 330 bit and 660 bit versions. These attacks were dealt with quite speedily by the anti-virus vendors, which has resulted in hackers stepping up their game again.

"In spite of the fact that we were able to decrypt 330 and 660 bit keys within a reasonably short space of time, keys of this length are already pushing the boundaries of modern cryptography. If RSA (or any other similar algorithm which uses a public key) were to be appropriately implemented in a new creation, antivirus companies might find themselves powerless, even if maximum computing power were to be applied to decrypting the key," said author of the report, Alexander Gostev, a senior virus analyst at Kaspersky Lab.

Gostev advised the commercial and technology industries to take a unified stance of prevention rather than cure against such malice. Organisations, he said, should back up everything on a regular basis, and antivirus companies should make it impossible for those will ill intent to encrypt data.

"Sadly, the authors of Gpcode, Cryzip, and Krotten are still at liberty. Great efforts are being made to apprehend them," he continued.

"However, even if they are arrested, there's nothing to prevent other malicious users from implementing such techniques in order to make money. Because of this, ransomware will undoubtedly remain a major headache for the antivirus industry, at least in the near future."

Featured Resources

Four strategies for building a hybrid workplace that works

All indications are that the future of work is hybrid, if it's not here already

Free webinar

The digital marketer’s guide to contextual insights and trends

How to use contextual intelligence to uncover new insights and inform strategies

Free Download

Ransomware and Microsoft 365 for business

What you need to know about reducing ransomware risk

Free Download

Building a modern strategy for analytics and machine learning success

Turning into business value

Free Download

Most Popular

Russian hackers declare war on 10 countries after failed Eurovision DDoS attack
hacking

Russian hackers declare war on 10 countries after failed Eurovision DDoS attack

16 May 2022
Windows Server admins say latest Patch Tuesday broke authentication policies
Server & storage

Windows Server admins say latest Patch Tuesday broke authentication policies

12 May 2022
IT admin deletes company’s databases and is jailed for seven years
Policy & legislation

IT admin deletes company’s databases and is jailed for seven years

16 May 2022