5 Common Types of Ransomware You Should Know About (2024)

Malignant (malicious) software, aka malware, are programs that enter computers and other devices and perform unauthorized operations affecting the data, systems, or networks. Ransomware are malware designed to lock users' systems or their access to files until a ransom is paid. Today, they are hot cakes in the cyber underworld, with thousands of users and businesses becoming victims. In most cases, attackers demand a hefty sum as ransom. According to a report, the average amount of reported ransomware transactions per month in 2021 was $102.3 million.

5 Common Types of Ransomware You Should Know About (1)

  • Resources
  • Cybersecurity Essentials
  • Common Ransomware Types

1

Locker Ransomware

2

Crypto-Ransomware

3

Scareware

4

Leakware

5

Ransomware As a Service (RaaS)

Types Of Ransomware

Ransomware continues to evolve in terms of nature (mode of attack) and sophistication. With victims willing to pay without choice, threat actors have brought in a great deal of innovation, the scope of which includes double- or triple extortion ransomware and ransomware-as-a-service.

Ransomware can be broadly classified into two types–one that restricts users' access to systems (locker ransomware), and one that encrypts the data and files from being accessible to the users (crypto-ransomware:) Below are some of the more traditional and nuanced variants of ransomware.

5 Common Types of Ransomware You Should Know About (2)

1.Locker Ransomware

These types of ransomware lock the users out of their systems. Most of the time, users are allowed to view only the lock screen or interact with a screen containing the ransom demand. The mouse and keyboard would be partially enabled to make the payment to the attacker. Lockers usually don't destroy the data as it only prevents users from accessing it. A timer with a deadline would be displayed to persuade the victim to pay up.

5 Common Types of Ransomware You Should Know About (3)

2.Crypto-Ransomware

As the most common type of ransomware, they encrypt the data, information, or files on the victims' device. The victim would usually be able to see the data and even use the system. However, they would not be able to access the data due to encryption. Crypto ransomware also prompts the victims to make the payment. If the user misses the deadline, all encrypted data would be permanently deleted.

5 Common Types of Ransomware You Should Know About (4)

3.Scareware

Scareware generally tries to freak the users out by displaying an alarming message and consequently tricks them into downloading malware. The attackers often use prompts that look official and legitimate and urge the user to act fast without giving them much time to think or analyze. The prompts can be a popup, a threatening message, or a false button, displaying alarming messages such as: "Your PC is slow. Speed up Now", or "Attackers can see your IP, Protect it now." Users who take the bait enable the ransomware to enter their systems and lock them out or encrypt their data.

5 Common Types of Ransomware You Should Know About (5)

4.Leakware

Through leakware, the attacker, instead of destroying the data, threatens to release it on public domains. Also known as Doxware, leakware attacks are targeted at organizations like banks and nationalized entities that handle confidential or sensitive data.

5 Common Types of Ransomware You Should Know About (6)

5.Ransomware As a Service (RaaS)

RaaS is where the threat actors embrace a SaaS-like business model to carry out ransomware attacks. RaaS operates like an affiliate network and allows cybercriminals with low technical knowledge to subscribe to RaaS and launch ransomware attacks. Members of the affiliate earn a percentage of the ransom payment. The RaaS model is one of the prime reasons for the dramatic increase in ransomware attacks in the recent past because it removes the barrier of prerequisite coding knowledge to launch an attack.

Note that scareware, leakware, and RaaS are essentially crypto- or locker ransomware variants.

Ransomware continues to devastate businesses, MSPs, and their clients. Here is a list of some of the most known and infamous ransomware programs:

5 Common Types of Ransomware You Should Know About (7)

1.CryptoLocker

One of the earliest ransomware strains, CryptoLocker encrypts the victims' data and offers a private key to decrypt in exchange for bitcoins or pre-paid vouchers. The attackers threaten to delete the private key upon missing the deadline, denying access to the data permanently.

● Year of Emergence: 2013
● Target: Computers running on Microsoft Windows
● Mode of Propagation: Infectious email attachments
● Areas Affected: Across the globe
● Estimated extortion: $3 million

5 Common Types of Ransomware You Should Know About (8)

2.Bad Rabbit

Bad Rabbit encrypts the user's file tables and demands Bitcoins to decrypt them. It primarily affected government authorities like the Ministry of Infrastructure of Ukraine. Some of the strings used in the code contained character names from the popular series Game of Thrones.

● Year of Emergence: 2017
● Target: Organizations and consumers
● Propagation: via fake Adobe Flash update request
● Areas Affected: Russia, Ukraine, and Eastern Europe
● Estimated extortion: Unknown, with a publicly admitted ransom payment of $1 million.

5 Common Types of Ransomware You Should Know About (9)

3.NotPetya (Petya)

This malware directly infects the system's boot record and encrypts the NTFS file system. This prevents the system from booting into the OS until the ransom is paid. Some researchers have deemed it a nation state 'act of war' against Ukraine rather than cybercriminals' intent for money.

● Year of Emergence: 2016
● Target: Computers running on Microsoft Windows
● Propagation: via infectious email attachments
● Areas Affected: Mainly Ukraine
● Estimated extortion: Unknown

5 Common Types of Ransomware You Should Know About (10)

4.Cerber

Cerber is crypto-ransomware RaaS that infects the system when the user clicks on a malicious ad or a spammy email initiated by the attacker.

● Year of Emergence: 2016
● Target: cloud-based Microsoft 365 users
● Propagation: phishing campaigns and malvertising
● Areas Affected: Across the globe
● Estimated extortion: Around $2 million in its first year

5 Common Types of Ransomware You Should Know About (11)

5.WannaCry

WannaCry launches a worm attack into the target system, locks the data, and demands a ransom in cryptocurrency. It spreads rapidly within systems. Its transport code uses an exploit known as EternalBlue–a cyberattack exploit developed by the U.S. National Security Agency (NSA)-- to gain access and make copies of itself.

● Year of Emergence: 2017
● Target: Computers running on Microsoft Windows
● Propagation: via a Microsoft exploit known as EternalBlue
● Areas Affected: 150 countries across the globe
● Estimated extortion: A total of 327 payments amounting to US$130,634.77

5 Common Types of Ransomware You Should Know About (12)

6.Dharma (CrySiS)

Dharma is a RaaS operation targeting small and medium businesses (SMBs) that cannot afford a high-profile cybersecurity team. It allows the attackers to encrypt the directory files on the victims' Windows-based systems. Once it conceals within the system, it infects each file being added to the directory. Threat actors using Dharma often demand relatively smaller ransom in the range of $8000 to $10000. However, the number of attacks that happened was of huge proportions, making it one of the most effective RaaS ever created.

● Year of Emergence: 2016
● Target: directories inside the user’s directory on Windows
● Propagation: via phishing emails or attacks on Remote Desktop Protocol (RDP) entry points.
● Areas Affected: Across the globe
● Estimated extortion: $24 million

5 Common Types of Ransomware You Should Know About (13)

7.Maze

Maze works on an affiliated network of cybercriminals and mainly targets SaaS companies. Once Maze affects an IT provider's network, it spreads onto the network of their clients' networks too. Maze usually encrypts data on the victim's system and threatens to leak it online unless the ransom is paid in cryptocurrencies.

● Year of Emergence: 2019
● Target: enterprise networks running on Windows
● Propagation: RDP brute force attacks and spam emails
● Areas Affected: Across the globe
● Estimated extortion: $24 million

There has been a steady increase in the number of ransomware attacks with each passing year. This not only causes financial damage to firms but also dampens their reputation and destroys the customers' trust. Here are some important measures that MSPs and businesses can take to avoid ransomware attacks:

● Use up-to-date versions of operating systems, browsers, antivirus, and software applications.
● Always back up important data on cloud servers or as hard, offline copies. This will help protect data and reduce the impact of crypto-ransomware attacks.
● Manage cookies carefully, allowing only the essential ones from any site
● Download software applications and antivirus from legitimate sources only.
● MSPs can educate their clients, and businesses can educate their employees on malware attacks and safe browsing.
● Build a cybersecurity team to proactively mitigate cybersecurity attacks and provide all essential support and remediation should an attack or a cybersecurity event occur.
● Hire a team of ethical hackers to discover and patch vulnerabilities across networks and systems.
● Use Network Detection and Response (NDR) products that use technologies like deep learning and statistical analysis to detect and respond to suspicious activities and actors on networks. This can take companies a long way in minimizing ransomware risks while identifying the weak spots in their networks.

Featured Resources

Prevention is no longer enough

Getting Ahead of Today’s Fast-Growing Ransomware Threats

Manufacturing network vulnerabilities

A blueprint for combatting ransomware in the manufacturing industry

Insider Threats – Who can you trust?

Insider threats are becoming center stage to some of the deadliest cyberattacks in recent news.

Network Threat Defense Software

Novacommandcan helpdetectthreats by inspecting andanalyzingthe network traffic. The information about the network traffic (metadata) will be correlated andanalyzedas well.

By doing this, threats can be detectedinan early stage by theirbehavior, destination, or a combination of both.

Novacommandwill not 'defend' you against threats but will alarm you on a threat and if needed initiate an action with a 3rd party integration like a firewall or EPP.

5 Common Types of Ransomware You Should Know About (14)

5 Common Types of Ransomware You Should Know About (15)

FAQs

Counting the number of ransomware is beyond anyone's capabilities. Broadly speaking, there are two types of ransomware - crypto-ransomware that encrypts your data and locker ransomware that locks you out of your system.

The most commonly reported variants in H1 2021 were REvil/Sodinokibi, Conti, DarkSide, Avaddon, and Phobos.

Ransomware is a type of malware. Malware attacks usually come in the form of a computer virus or worm.

5 Common Types of Ransomware You Should Know About (2024)

FAQs

What are the top 5 ransomware? ›

DarkSide, REvil, Conti, LockBit, and Maze are notorious ransomware groups that employ advanced techniques and tactics. These include advanced exploitation methods, the Ransomware-as-a-Service (RaaS) model, double extortion tactics, targeted industries, and significant financial losses and operational disruption.

What is the most common type of ransomware? ›

Crypto ransomware is the most common type of ransomware attack. This type of ransomware encrypts the victim's files, preventing them from being recovered unless the user pays the ransom.

What is common in ransomware attacks? ›

Data Loss: Some ransomware attacks encrypt data as part of their extortion efforts. Often, this can result in data loss, even if the company pays the ransom and receives a decryptor. Data Breach: Ransomware groups are increasingly pivoting to double or triple extortion attacks.

What are the most common ransomware targets? ›

1. Education. The education sector had the highest ransomware attack rate as of 2023, according to Sophos' most recent "State of Ransomware" report. Eighty percent of elementary, middle and high schools and 79% of higher education institutions reported sustaining attacks in the year leading up to the survey.

What is the most active ransomware? ›

LockBit is leading the charge in ransomware attacks and is the most dominant ransomware group. In the first half of 2024 alone they had 48 confirmed attacks, targeting business services, retail, and manufacturing.

What is the most common way ransomware attacks start? ›

Ransomware is just one of the threat categories that's commonly distributed by phishing emails. A typical attack attempt begins when a user receives a malicious email that instructs them to open a tainted file attachment.

What is the most common cause of ransomware? ›

Ransomware is often spread through phishing emails that contain malicious attachments or through drive-by downloading. Drive-by downloading occurs when a user unknowingly visits an infected website and then malware is downloaded and installed without the user's knowledge.

What is the most common way ransomware is delivered? ›

Some of the most common ways ransomware is delivered are through phishing emails, drive-by downloads, exploit kits and RDP exploits. According to Malwarebytes' 2024 State of Malware report, in 2023 the number of known ransomware attacks increased by 68% from the previous year.

What is the number one threat to ransomware? ›

Ransomware and malware stand out as the fastest-growing threat of 2024, with 42% of respondents ranking them as topmost fastest growing type of threat. Cloud assets, including SaaS applications, cloud-based storage, and cloud infrastructure management, remain the primary targets for such attacks.

What is the most impactful ransomware? ›

7 Famous Ransomware Attacks
  • AIDS Trojan (1989) The first ransomware attack in history dates back to 1989, long before cyber attackers used the internet to spread malware. ...
  • Colonial Pipeline (2021) ...
  • CryptoLocker (2013) ...
  • British Library (2023) ...
  • WannaCry (2017) ...
  • Costa Rican Government (2022) ...
  • REvil (2019)
Jan 22, 2024

What is the most destructive ransomware? ›

Wiper Ransomware

Wiper ransomware looks like conventional ransomware but is much more destructive. Instead of simply encrypting data, Wiper permanently deletes or corrupts it, leaving no chance of recovery, even if a ransom is paid.

What is the most famous case of ransomware? ›

WannaCry (2017)

However, many users hadn't updated their systems, leaving their computers vulnerable to cyber attacks. One of the costliest and most famous ransomware attacks in history, WannaCry cost an estimated $4 billion.

What are the top 3 causes of successful ransomware attacks? ›

Phishing, remote desk protocol (RDP) exploitation and software vulnerabilities are the principal root causes of ransomware infections.

What are the top ransomware as a service? ›

LockBit This ransomware emerged in June 2021 and exploits SMB and PowerShell to spread malware through a compromised network. It claims to have the fastest market encryption and has compromised over 50 organizations across different industries.

What is the fastest ransomware? ›

Rorschach, a highly sophisticated ransomware strain, stands out most for its ability to encrypt data more quickly than other known strains and evade advanced security detection, according to ransomware researchers and experts.

Top Articles
French Martini Recipe - Daily Appetite
Authentic German Sauerbraten Recipe - House of Nash Eats
Diario Las Americas Rentas Hialeah
UPS Paketshop: Filialen & Standorte
Cold Air Intake - High-flow, Roto-mold Tube - TOYOTA TACOMA V6-4.0
Stretchmark Camouflage Highland Park
Access-A-Ride – ACCESS NYC
Mustangps.instructure
30% OFF Jellycat Promo Code - September 2024 (*NEW*)
Fototour verlassener Fliegerhorst Schönwald [Lost Place Brandenburg]
Rochester Ny Missed Connections
Ktbs Payroll Login
FIX: Spacebar, Enter, or Backspace Not Working
What’s the Difference Between Cash Flow and Profit?
Jscc Jweb
Vichatter Gifs
Rapv Springfield Ma
Buying risk?
Animal Eye Clinic Huntersville Nc
Five Day National Weather Forecast
Katherine Croan Ewald
Trac Cbna
Yakimacraigslist
라이키 유출
Craigslist Pinellas County Rentals
Understanding Gestalt Principles: Definition and Examples
Caring Hearts For Canines Aberdeen Nc
Southwest Flight 238
Accuradio Unblocked
Nk 1399
Maine Racer Swap And Sell
Ultra Ball Pixelmon
How rich were the McCallisters in 'Home Alone'? Family's income unveiled
Old Peterbilt For Sale Craigslist
Arcane Odyssey Stat Reset Potion
Hisense Ht5021Kp Manual
Mohave County Jobs Craigslist
Linda Sublette Actress
Cygenoth
Why I’m Joining Flipboard
Armageddon Time Showtimes Near Cmx Daytona 12
Home Auctions - Real Estate Auctions
Craigslist Rooms For Rent In San Fernando Valley
Gw2 Support Specter
American Bully Puppies for Sale | Lancaster Puppies
Sacramentocraiglist
The top 10 takeaways from the Harris-Trump presidential debate
Puss In Boots: The Last Wish Showtimes Near Valdosta Cinemas
Home | General Store and Gas Station | Cressman's General Store | California
The Goshen News Obituary
Osrs Vorkath Combat Achievements
Latest Posts
Article information

Author: Arielle Torp

Last Updated:

Views: 6096

Rating: 4 / 5 (41 voted)

Reviews: 88% of readers found this page helpful

Author information

Name: Arielle Torp

Birthday: 1997-09-20

Address: 87313 Erdman Vista, North Dustinborough, WA 37563

Phone: +97216742823598

Job: Central Technology Officer

Hobby: Taekwondo, Macrame, Foreign language learning, Kite flying, Cooking, Skiing, Computer programming

Introduction: My name is Arielle Torp, I am a comfortable, kind, zealous, lovely, jolly, colorful, adventurous person who loves writing and wants to share my knowledge and understanding with you.