In the history of computer viruses, they have gone from experimental, to stealthy, to dangerous viruses such as C.I.H. By applying the CMM model on malware maturity, it’s easy to see that the art of creating malware follows the steps indicated in the model.
But, each process can be divided into sub processes, and onto each sub process the CMM model can be applied. Consider the maturity for ransomware as a sub process of malware as a whole. When considering this, also take the following snapshot from “Google Trends” into consideration.
What happens when the ransomware developers realize that ransomware can be extended, not only to data, but to the control over IoT devices? The chilling realization that not only are you not in control of your own home, but somebody else is…
We are not there quite yet – but ransomware keeps menacing the computer society, but thankfully there are small beacons of light when it comes to fighting them. One such beacon is the web service “No more ransom”, a service provided by Europol and other actors.