6 Kinds of Ransomware You Might Not Know About

There have been a number of ransomware attacks in the news lately. If you’re not familiar with ransomware, it’s a type of cyber attack that holds your computer or files hostage until you pay a ransom. In this blog post, we will discuss six kinds of ransomware that you might not know about. 

6 Kinds of Malware

Related Blog: Different kinds of ransomware attacks and their types

Locky

In 2016, organized hackers first used Locky ransomware. Locky encrypts 160 file types and spreads via fake emails with infected attachments. Users downloaded ransomware from a phishing email. Phishing is a form of social engineering. Locky ransomware targets design, development, engineering, and testing files.

Rabbit

Bad Rabbit spread via drive-by attacks in 2017. Attacks using insecure websites In a drive-by ransomware attack, a user visits a real website unaware that it’s been hacked. For most drive-by attacks, a user must visit a compromised page. In this case, running a malware-laden installer caused the infection. Malware dropper Bad Rabbit infected the user’s computer by requesting a fake Adobe Flash installation.

Ryuk

In August 2018, Ryuk spread and disabled Windows’ recovery function. Without an external backup, the data couldn’t be restored. Ryuk encrypts network HDDs. Many targeted US organizations paid the ransom. Damages top $640,000.

Shade/Troldesh

Shade or Troldesh ransomware spread via spam emails with infected links or attachments in 2015. The Troldesh attackers emailed their victims. “Good” victims got discounts. This kind of behaviour is rare.

WannaCry

WannaCry infected 150 countries in 2017. It exploited an NSA-created Windows security flaw leaked by the Shadow Brokers hacker group. WannaCry infected 230,000 machines. The attack damaged 92 million pounds worth of NHS hospitals in the UK. Locked-out users paid a Bitcoin ransom. The hacker exploited an operating system vulnerability for which a patch existed before the attack. WannaCry cost $4 billion worldwide.

CryptoLocker

CryptoLocker spread via infected email attachments in 2007. Ransomware encrypts important computer data. Affected computers total 500,000. Law enforcement and security companies seized control of a network of hijacked home computers used to spread CryptoLocker. This allowed agencies and companies to intercept criminals’ network data. This led to an online portal where victims could unlock their data. Their data was released without paying a ransom.

Related Blog: Top 5 signs you are becoming a victim of a ransomware attack

Conclusion

Ransomware is a growing problem that security experts aren’t forecasting to slow any time soon. In fact, if anything, the threat of ransomware looks to be expanding and becoming more complex as cybercriminals find it to be not only profitable but highly effective. With so many kinds of ransomware out there, you’ll want to take precautions to protect your business from becoming one of its victims. 

Oppos, Inc. can be your dedicated partner against ransomware. With our 60 years of experience, we have helped different companies combat malware and lessen the damage it causes to their businesses.

If you are thinking about the safety of your business or company regarding ransomware, don’t hesitate to call us right away! We are here to help.

2 Responses

Leave a Reply

Your email address will not be published. Required fields are marked *

Sign up for our Newsletter

Stay Connected! Subscribe now to our newsletter.