There have been a number of ransomware attacks in the news lately. If you’re not familiar with ransomware, it’s a type of cyber attack that holds your computer or files hostage until you pay a ransom. In this blog post, we will discuss six kinds of ransomware that you might not know about.
Related Blog: Different kinds of ransomware attacks and their types
Locky
In 2016, organized hackers first used Locky ransomware. Locky encrypts 160 file types and spreads via fake emails with infected attachments. Users downloaded ransomware from a phishing email. Phishing is a form of social engineering. Locky ransomware targets design, development, engineering, and testing files.
Rabbit
Bad Rabbit spread via drive-by attacks in 2017. Attacks using insecure websites In a drive-by ransomware attack, a user visits a real website unaware that it’s been hacked. For most drive-by attacks, a user must visit a compromised page. In this case, running a malware-laden installer caused the infection. Malware dropper Bad Rabbit infected the user’s computer by requesting a fake Adobe Flash installation.
Ryuk
In August 2018, Ryuk spread and disabled Windows’ recovery function. Without an external backup, the data couldn’t be restored. Ryuk encrypts network HDDs. Many targeted US organizations paid the ransom. Damages top $640,000.
Shade/Troldesh
Shade or Troldesh ransomware spread via spam emails with infected links or attachments in 2015. The Troldesh attackers emailed their victims. “Good” victims got discounts. This kind of behaviour is rare.
WannaCry
WannaCry infected 150 countries in 2017. It exploited an NSA-created Windows security flaw leaked by the Shadow Brokers hacker group. WannaCry infected 230,000 machines. The attack damaged 92 million pounds worth of NHS hospitals in the UK. Locked-out users paid a Bitcoin ransom. The hacker exploited an operating system vulnerability for which a patch existed before the attack. WannaCry cost $4 billion worldwide.
CryptoLocker
CryptoLocker spread via infected email attachments in 2007. Ransomware encrypts important computer data. Affected computers total 500,000. Law enforcement and security companies seized control of a network of hijacked home computers used to spread CryptoLocker. This allowed agencies and companies to intercept criminals’ network data. This led to an online portal where victims could unlock their data. Their data was released without paying a ransom.
Related Blog: Top 5 signs you are becoming a victim of a ransomware attack
Conclusion
Ransomware is a growing problem that security experts aren’t forecasting to slow any time soon. In fact, if anything, the threat of ransomware looks to be expanding and becoming more complex as cybercriminals find it to be not only profitable but highly effective. With so many kinds of ransomware out there, you’ll want to take precautions to protect your business from becoming one of its victims.
Oppos, Inc. can be your dedicated partner against ransomware. With our 60 years of experience, we have helped different companies combat malware and lessen the damage it causes to their businesses.
If you are thinking about the safety of your business or company regarding ransomware, don’t hesitate to call us right away! We are here to help.
2 Responses