{"id":66968,"date":"2016-12-12T21:01:34","date_gmt":"2016-12-13T05:01:34","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=66968"},"modified":"2025-05-27T19:24:53","modified_gmt":"2025-05-28T02:24:53","slug":"2016-a-year-at-ransom","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-a-year-at-ransom\/","title":{"rendered":"2016: A Year at Ransom"},"content":{"rendered":"<p>This week&#8217;s\u00a0<em><a href=\"https:\/\/www.mcafee.com\/common\/js\/asset_redirect.html?eid=16Q4GLOBALPROSM11549&amp;url=https:\/\/www.mcafee.com\/us\/resources\/reports\/rp-quarterly-threats-dec-2016.pdf\">McAfee Labs Threats Report: December 2016<\/a><\/em>\u00a0provides an overview of how ransomware has evolved over the course of 2016, and how the industry has responded.<\/p>\n<p>Through the end of Q3, the number of new ransomware samples this year totaled 3,860,603, an increase of 80% since the beginning of the year. Beyond volume, ransomware exhibited notable technical advances in 2016, including partial or full disk encryption, encryption of websites used by legitimate applications, anti-sandboxing, more sophisticated exploit kits for ransomware delivery, and more ransomware-as-a-service developments.<\/p>\n<p>In March we saw the appearance of partial disk encryption instead of file encryption. This type of ransomware encrypts the master file table, making files inaccessible. Ransomware authors have enabled their malware to detect and evade common sandboxing, the most common method used to thwart ransomware. There was also a significant shift by ransomware attackers from consumer to business targets, as a few successful campaigns have encouraged more attacks.<\/p>\n<p>But 2016 also saw positive developments in the areas of industry collaboration and successful public-private partnerships. This summer, a group of security vendors and law enforcement organizations, led by Europol and including McAfee, announced the \u201cNo More Ransom!\u201d collaboration to fight ransomware. This effort provides consumers prevention advice, investigation assistance, and decryption tools to address the ransomware threat. No More Ransom! has allowed ransomware victims to avoid paying an estimated US$1.48 million (\u20ac1.35 million) in ransom payments to cybercriminals. The No More Ransom! portal has received more than 24.5 million visitors since its launch, a consolidated average of 400,000 visitors per day.<\/p>\n<p>Furthermore, law enforcement and security vendors collaborated by sharing threat intelligence, research, and recovery efforts. The year saw several takedowns of ransomware systems, including the <a href=\"https:\/\/www.mcafee.com\/us\/downloads\/free-tools\/shadedecrypt.aspx\">Shade<\/a> takedown in July and the <a href=\"https:\/\/www.mcafee.com\/us\/downloads\/free-tools\/wildfiredecrypt.aspx\">WildFire<\/a> takedown in September.<\/p>\n<h2>Quarter Report<\/h2>\n<p>For more information on the Ransomware section of this quarter\u2019s report, please visit <a href=\"https:\/\/www.mcafee.com\">www.mcafee.com<\/a> for the <a href=\"https:\/\/www.mcafee.com\/common\/js\/asset_redirect.html?eid=16Q3GLOBALPROSM9642&amp;url=https:\/\/www.mcafee.com\/us\/resources\/reports\/rp-quarterly-threats-sep-2016.pdf\">full report<\/a>.<\/p>\n<p style=\"padding-left: 30px;\"><em>\u201cLast year we predicted that the incredible growth in ransomware attacks in 2015 would continue into 2016. The year 2016 may indeed be remembered as \u2018the year of ransomware,\u2019 with both a huge jump in the number of ransomware attacks, a number of high-profile attacks that generated wide media interest, and significant technical advances in this type of attack. On the other side of the ransomware attacks, greater cooperation between the security industry and law enforcement, and constructive collaboration between industry rivals truly has begun to deliver results in taking the fight to the criminals.\u00a0As a result, we expect the growth of ransomware attacks to slow in 2017.\u201d<\/em><\/p>\n<p style=\"padding-left: 30px;\"><em>\u2014Vincent Weafer, Vice President, McAfee Labs, McAfee<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This week&#8217;s\u00a0McAfee Labs Threats Report: December 2016\u00a0provides an overview of how ransomware has evolved over the course of 2016, and&#8230;<\/p>\n","protected":false},"author":600,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[180,4140,4549],"coauthors":[2994],"class_list":["post-66968","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-malware","tag-quarterly-threats-report","tag-ransomware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>2016: A Year at Ransom | McAfee Blog<\/title>\n<meta name=\"description\" content=\"This week&#039;s McAfee Labs Threats Report: December 2016 provides an overview of how ransomware has evolved over the course of 2016, and how the industry has responded.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"2016: A Year at Ransom | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"This week&#039;s McAfee Labs Threats Report: December 2016 provides an overview of how ransomware has evolved over the course of 2016, and how the industry has responded.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-a-year-at-ransom\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-12-13T05:01:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-28T02:24:53+00:00\" \/>\n<meta name=\"author\" content=\"Chris Palm\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Bulldog_Palm\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chris Palm\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-a-year-at-ransom\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-a-year-at-ransom\/\"},\"author\":{\"name\":\"Chris Palm\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/207649ac39a514cf4909430626ea679b\"},\"headline\":\"2016: A Year at Ransom\",\"datePublished\":\"2016-12-13T05:01:34+00:00\",\"dateModified\":\"2025-05-28T02:24:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-a-year-at-ransom\/\"},\"wordCount\":423,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"keywords\":[\"malware\",\"Quarterly Threats Report\",\"ransomware\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-a-year-at-ransom\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-a-year-at-ransom\/\",\"name\":\"2016: A Year at Ransom | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"datePublished\":\"2016-12-13T05:01:34+00:00\",\"dateModified\":\"2025-05-28T02:24:53+00:00\",\"description\":\"This week's McAfee Labs Threats Report: December 2016 provides an overview of how ransomware has evolved over the course of 2016, and how the industry has responded.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-a-year-at-ransom\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-a-year-at-ransom\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-a-year-at-ransom\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"2016: A Year at Ransom\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/207649ac39a514cf4909430626ea679b\",\"name\":\"Chris Palm\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/dd0452ed764368de38e95e2fadf1c461\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e2b84a91b8c45c7a0096a954e84e5004?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e2b84a91b8c45c7a0096a954e84e5004?s=96&d=mm&r=g\",\"caption\":\"Chris Palm\"},\"description\":\"Chris Palm has 20 years of experience focused on the intersection of technology, business, and policy, where issues of security and privacy are shaping how technology impacts our lives. He has worked to tell these stories with technology leaders such as McAfee, VeriSign, Symantec, Entrust, Microsoft, Sun Microsystems, and Intel Security. As a director of corporate communications for McAfee, Chris manages executive public relations, thought leadership\/research, and crisis and issues communications for the organization\u2019s Office of the CTO, McAfee Labs, and the Advanced Threat Research group. Chris holds an MBA from Thunderbird School of Global Management and a BA in English Language and Literature from University of Southern California.\",\"sameAs\":[\"http:\/\/www.intelsecurity.com\",\"https:\/\/x.com\/@Bulldog_Palm\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/cpalm\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"2016: A Year at Ransom | McAfee Blog","description":"This week's McAfee Labs Threats Report: December 2016 provides an overview of how ransomware has evolved over the course of 2016, and how the industry has responded.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"2016: A Year at Ransom | McAfee Blog","og_description":"This week's McAfee Labs Threats Report: December 2016 provides an overview of how ransomware has evolved over the course of 2016, and how the industry has responded.","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-a-year-at-ransom\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2016-12-13T05:01:34+00:00","article_modified_time":"2025-05-28T02:24:53+00:00","author":"Chris Palm","twitter_card":"summary_large_image","twitter_creator":"@Bulldog_Palm","twitter_site":"@McAfee","twitter_misc":{"Written by":"Chris Palm","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-a-year-at-ransom\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-a-year-at-ransom\/"},"author":{"name":"Chris Palm","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/207649ac39a514cf4909430626ea679b"},"headline":"2016: A Year at Ransom","datePublished":"2016-12-13T05:01:34+00:00","dateModified":"2025-05-28T02:24:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-a-year-at-ransom\/"},"wordCount":423,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"keywords":["malware","Quarterly Threats Report","ransomware"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-a-year-at-ransom\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-a-year-at-ransom\/","name":"2016: A Year at Ransom | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"datePublished":"2016-12-13T05:01:34+00:00","dateModified":"2025-05-28T02:24:53+00:00","description":"This week's McAfee Labs Threats Report: December 2016 provides an overview of how ransomware has evolved over the course of 2016, and how the industry has responded.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-a-year-at-ransom\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-a-year-at-ransom\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-a-year-at-ransom\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"2016: A Year at Ransom"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/207649ac39a514cf4909430626ea679b","name":"Chris Palm","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/dd0452ed764368de38e95e2fadf1c461","url":"https:\/\/secure.gravatar.com\/avatar\/e2b84a91b8c45c7a0096a954e84e5004?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e2b84a91b8c45c7a0096a954e84e5004?s=96&d=mm&r=g","caption":"Chris Palm"},"description":"Chris Palm has 20 years of experience focused on the intersection of technology, business, and policy, where issues of security and privacy are shaping how technology impacts our lives. He has worked to tell these stories with technology leaders such as McAfee, VeriSign, Symantec, Entrust, Microsoft, Sun Microsystems, and Intel Security. As a director of corporate communications for McAfee, Chris manages executive public relations, thought leadership\/research, and crisis and issues communications for the organization\u2019s Office of the CTO, McAfee Labs, and the Advanced Threat Research group. Chris holds an MBA from Thunderbird School of Global Management and a BA in English Language and Literature from University of Southern California.","sameAs":["http:\/\/www.intelsecurity.com","https:\/\/x.com\/@Bulldog_Palm"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/cpalm\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/66968","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/600"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=66968"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/66968\/revisions"}],"predecessor-version":[{"id":214474,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/66968\/revisions\/214474"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=66968"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=66968"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=66968"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=66968"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}