Ryuk and Conti: From floppy discs to Claude Mythos, how ransomware grew into a multibillion‑dollar industry

Ryuk and Conti: From floppy discs to Claude Mythos, how ransomware grew into a multibillion‑dollar industry

The Evolution of Ransomware: From Floppy Disks to AI-Powered Extortion

In 1989, evolutionary biologist Joseph Popp created the first known ransomware a crude but prescient scheme designed to raise awareness about public health risks. Distributing 20,000 floppy disks under the guise of an AIDS research survey, Popp’s malware locked users’ files (or rather, their filenames) and demanded payment for restoration. Though his motives were unconventional, the attack foreshadowed a criminal industry that would later cripple economies. Popp was arrested for blackmail but deemed mentally unfit for trial.

By the mid-1990s, researchers warned of ransomware’s potential as a large-scale extortion tool, but two critical developments were needed to turn it into a viable criminal enterprise: untraceable communication and anonymous payments. The Tor network, released in 2004, provided the former, while cryptocurrencies particularly Bitcoin ATMs appearing in 2013 enabled the latter.

The mid-2010s marked the rise of "commodity ransomware," with strains like Cryptolocker proving that victims would pay small ransoms to recover encrypted data. As competition grew, criminals shifted tactics. By 2018, second-generation ransomware like Ryuk abandoned indiscriminate attacks in favor of targeting high-value businesses, negotiating ransoms, and even assisting with decryption driving payouts into the millions.

The COVID-19 pandemic accelerated the threat, as remote work exposed unsecured devices and networks. Meanwhile, advancements in backup systems and stricter data regulations like GDPR led to a new strategy: double extortion. By 2019, gangs began stealing sensitive data before encrypting it, threatening to leak it unless paid. This model turned ransomware into a multibillion-dollar industry, with groups like Russia-backed Conti setting record demands including attacks on hospitals and critical infrastructure.

Today, fourth-generation ransomware leverages AI to lower the barrier to entry. Criminals can now lease malware on the dark web, while tools like Anthropic’s Claude Mythos demonstrate AI’s ability to outperform humans in hacking. Despite law enforcement crackdowns and improved defenses, roughly a quarter of breaches still result in ransom payments. Many organizations remain vulnerable due to outdated software, while geopolitical tensions shield state-tolerated cybercriminals from consequences.

From Popp’s floppy disks to AI-driven extortion, ransomware has evolved into a persistent, adaptive threat one that continues to exploit gaps in cybersecurity and public apathy.

Source: https://theconversation.com/from-floppy-discs-to-claude-mythos-how-ransomware-grew-into-a-multibillion-dollar-industry-281000

Ryuk Labs cybersecurity rating report: https://www.rankiteo.com/company/ryuklabs

Arca Continental cybersecurity rating report: https://www.rankiteo.com/company/arca-continental

"id": "RYUARC1776788790",
"linkid": "ryuklabs, arca-continental",
"type": "Ransomware",
"date": "1/1989",
"severity": "100",
"impact": "5",
"explanation": "Attack threatening the organization's existence"
{'affected_entities': [{'industry': ['Healthcare',
                                     'Government',
                                     'Finance',
                                     'Various'],
                        'type': ['Healthcare',
                                 'Critical infrastructure',
                                 'Businesses']}],
 'attack_vector': ['Floppy disks',
                   'Tor network',
                   'Remote work vulnerabilities',
                   'AI-powered tools'],
 'data_breach': {'data_encryption': 'Yes (ransomware encryption)',
                 'data_exfiltration': 'Yes (double extortion tactic)',
                 'personally_identifiable_information': 'Yes',
                 'sensitivity_of_data': 'High',
                 'type_of_data_compromised': ['Sensitive data',
                                              'Personally identifiable '
                                              'information']},
 'description': 'The evolution of ransomware from its origins in 1989 to '
                'modern AI-powered extortion, highlighting key developments, '
                'attack vectors, and impacts on organizations and critical '
                'infrastructure.',
 'impact': {'data_compromised': 'Sensitive data stolen and leaked',
            'financial_loss': 'Billions of dollars in ransom payments',
            'identity_theft_risk': 'High (due to data leaks)',
            'operational_impact': 'Crippled economies and operations',
            'payment_information_risk': 'High (due to data leaks)',
            'systems_affected': ['Hospitals',
                                 'Critical infrastructure',
                                 'High-value businesses']},
 'initial_access_broker': {'high_value_targets': 'Yes (modern ransomware)'},
 'lessons_learned': 'Ransomware has evolved from simple extortion to a '
                    'multibillion-dollar industry leveraging AI, geopolitical '
                    'protections, and double extortion tactics. Organizations '
                    'remain vulnerable due to outdated software, unsecured '
                    'networks, and public apathy.',
 'motivation': ['Public health awareness (initial)',
                'Financial extortion',
                'Data theft and double extortion',
                'Geopolitical influence'],
 'post_incident_analysis': {'corrective_actions': ['Improved backup systems',
                                                   'Stricter data regulations',
                                                   'Enhanced monitoring',
                                                   'AI-driven cybersecurity '
                                                   'tools'],
                            'root_causes': ['Outdated software',
                                            'Unsecured remote work networks',
                                            'Geopolitical protections for '
                                            'cybercriminals',
                                            'Public apathy']},
 'ransomware': {'data_encryption': 'Yes',
                'data_exfiltration': 'Yes (double extortion)',
                'ransom_demanded': ['Small ransoms (early)',
                                    'Millions (modern)'],
                'ransom_paid': 'Roughly 25% of breaches result in payments',
                'ransomware_strain': ['AIDS Trojan (1989)',
                                      'Cryptolocker',
                                      'Ryuk',
                                      'Conti']},
 'recommendations': ['Improve backup systems',
                     'Enhance network security',
                     'Adopt stricter data regulations',
                     'Monitor dark web activity',
                     'Invest in AI-driven cybersecurity defenses'],
 'references': [{'source': 'Historical ransomware evolution'}],
 'regulatory_compliance': {'legal_actions': 'Joseph Popp arrested for '
                                            'blackmail',
                           'regulations_violated': ['GDPR (implied)']},
 'response': {'law_enforcement_notified': 'Yes (Joseph Popp arrested)',
              'remediation_measures': ['Improved backup systems',
                                       'Stricter data regulations (e.g., '
                                       'GDPR)']},
 'threat_actor': ['Joseph Popp',
                  'Cryptolocker operators',
                  'Ryuk operators',
                  'Conti (Russia-backed)',
                  'Dark web malware leasers',
                  'AI-powered hacking tools'],
 'title': 'The Evolution of Ransomware: Historical and Modern Threats',
 'type': 'Ransomware',
 'vulnerability_exploited': ['Outdated software',
                             'Unsecured devices and networks',
                             'Lack of backup systems',
                             'Geopolitical protections for cybercriminals']}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.