Examples of Ransomware
Some of the Ransomware strains are listed below
Reveton
Reveton locks the victim’s device completely and asks the victim to log in credentials. In general, the attackers show a fake official (any government security organization) message on the victim’s display. The whole system will be locked completely, and only by paying the ransom, the login credentials can be obtained. In some cases, the attackers also installed a trojan to steal passwords and other data in the victim’s computer.
Locky
It is a ransomware strain developed to lock the victim’s system completely. These kinds of ransomware are usually affected by email messages. When the email is opened, the victim is asked to enable macros to read the attached document. If the victim enables the macros, Locky begins its encryption process and encrypts many files. Usually, the email will be disguised as an invoice message.
Cryptolocker
It is one of the oldest forms of cyberattacks used for more than a decade. The attackers used the Cryptolocker botnet approach in ransomware in 2013. Even though the original Cryptolocker botnet was shut down in 2014, the attackers managed to earn more than millions. And many kinds of variants are still used. It is often impossible to decrypt the files or system without paying the ransom when Cryptolocker ransomware was used as the algorithms used to encrypt are very strong
Cerber
It is a type of ransomware that mainly targets cloud-based Microsoft office 365 users. Millions of users are fallen for this attack with large phishing operations.
Crysis
This ransomware encrypts files on fixed, removable, and network drives. It uses a strong encryption algorithm making it difficult to crack or decrypt the files. It usually spreads from email or installer files.
Bad Rabbit
This ransomware spreads from compromised websites that contain a fake adobe player installer file like “install_flash_palyer.exe.” If the victim executes the file, the system will reboot, and after rebooting, the screen will show the ransom details on the victim display.
Jigsaw
It is one of the destructive types of ransomware, which encrypts many data files and deletes them progressively until the ransom is paid. Usually, the attack will have a countdown of 72 hours, and files will be deleted for every hour until the ransom is paid or ultimately deleted every single file.
Cryptowall
It can be considered an advanced form of the crypto locker. There are multiple strains of this ransomware used worldwide with different names.
KeRanger
This ransomware was found on the BitTorrent client, and it is the first ransomware developed to block Mac OS applications.
Apart from these, there exist many other ransomware strains that can infect the systems of an organization or individual. Let us see the anatomy of ransomware attacks in coming weeks.
Stay Aware and Stay Safe with Clear Infosec
It is always necessary to provide Security Awareness Training to your workforce to keep them aware of the evolving threat landscape and stay fortified for any kind of targeted social engineering attacks. Get adapt to technologies and security trends with Clear Infosec