• Cyber Security
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware File Recovery
    • Ransomware Types
  • Ransomware Services
    • Ransomware Removal
    • Ransomware File Recovery
  • News
  • Tutorials
  • Ransomware TV

The Worst Types Of Ransomware

June 14, 2019Simeon Georgiev

Ransomware attacks have been frequent in the past few years. Every day we hear a new version of the ransomware attack on a company or an organization. With such a fast-growing industry, it is not possible to know how and when will you be under threat. The methods are still unknown and quite sophisticated.

Here are a few common types of ransomware:

Cryptolocker:

It is one of the first ransomware software that has been around since the past two decades. It was shut down in 2014 after it made almost 3 million dollars from victims all over the world. It is also known as the pioneer of ransomware technology and is now followed by many similar ransomware attackers.

Crysis:

This is also a very fast moving and malicious software that directly targets fixed, removable, and network drives using extremely high tech algorithms that are not easy to encrypt. These are spread through emails mostly and come as attachments to many people, urging them to click and check out a special offer or a new website or app. It also enters a system by falsely targeting applications for software updates.

Jigsaw:

This is a rather vicious software that works like a real hijacker. If the victim fails to pay the attacker, it will delete one file in one hour. Eventually, it will remove more and more files. The victim either ends up paying more or loses the data altogether.

Bad rabbit:

Bad rabbit is the malware that had initially taken over organizations in Russia and eastern Europe by storm. It is often attached to Adobe reader update and infects the system immediately.

CTB LOCKER:

The people behind this malware have a unique way of approaching their targets. They monitor their accounts, buying and selling habits, and then take information or pages from those websites to send you infected software through your emails.

Cerber:

This ransomware has just been brought into the market. The catch is that it has been created to be used in 12 different languages by the creator. So, as a result, many attackers have benefitted from it and still use it in different parts of the world. It usually attacks people who use iCloud services and decrypt their files. These malware agents commonly use phishing.

Locky:

A simple harmless looking attachment that looks like an invoice comes with your email address and decrypts everything. It instructs the user to open macros and read the files. Later it starts infecting the computer system.

WannaCry:

This malware has so far been the most vicious of all malware. It attacked many systems in 2017, across the world. Companies using Microsoft windows were its primary target, and a crypto worm was sent to take control of the files. Users were asked to pay in bitcoin cryptocurrency.

Hence, it does not matter what type of malware you are dealing with. Just keep in mind that you must be vigilant and extra careful with your personal information and files.

Simeon Georgiev
https://www.linkedin.com/in/simeon--georgiev/
I am a Cyber Security Enthusiast from Bulgaria. I like to write about malware and ransomware and global cyber attacks. You can reach me on Twitter @sgeorgiev1995 or Email: [email protected]
Previous post Loss Of Data And Restoration Next post Social Networking and Cyber Security

Related Articles

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

January 27, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Ransomware: 4 Types of the Latest Trend in Cybercrimes

February 1, 2018Simeon Georgiev
Ransomware: 4 Types of the Latest Trend in Cybercrimes

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

February 1, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Latest on Ransomware TV

https://vimeo.com/399908876?loop=0

Recent Posts

  • How to protect your organization against ransomware reinfections
  • AuKill Helps Ransomware Operators Disable EDR and Security Tools
  • AI-ransomware is a real threat, just not a realistic one yet
  • Rorschach is the new speed king in the ransomware space
  • The Role of Supply Chain Breaches in Ransomware Attacks

Stay Protected

Subscribe to our mailing list to get the latest cyber security and ransomware removal articles!

Thank you for subscribing.

Something went wrong.

Navigation

  • Cyber Security
    • Ransomware File Recovery
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware Types
  • News
  • Tutorials

Ransomware Attacks (Last 6M)

0

Connect & Protect

Facebook
Google+
LinkedIn
YouTube
Vimeo

More

  • BECOME A CONTRIBUTOR

MonsterCloud Reviews

© 2020 MonsterCloud.com. All Rights Reserved.