Top 10 Ransomware

RansomwareDescription
Dharma – RansomwareThe ransomware appends various extensions to infected files and is a variant of CrySiS. The malware has been in operation since 2016 and the threat actors behind the ransomware continue to release new variants which are not decryptable.
WannaCry – RansomwareThe ransomware uses exploits leaked by the Shadow Brokers and has infected a large number of computers including those in the government, telecom, and educational sectors. Files are encrypted denoted by the .WNCRYT extension. The bounty for WannaCry ranges from $300 to $600 but payments may not be uniquely associated with a system.
Fake Globe – RansomwareThe ransomware impersonates Globe ransomware and appends various extensions to encrypted files. The ransomware continues to evolve and multiple variants continue to appear in the wild. The malicious software is also known as Globe Imposter, Ox4444, and GUST. Victims are required to email the threat actor for the decryption key to gain access to the encrypted files.
Scarab – RansomwareThe ransomware uses AES encryption and adds various extensions to infected files. In November 2017 it was discovered the Necurs botnet was used to spread the malicious software. Multiple variants of the ransomware continue to appear on the threat landscape.
Stop – RansomwareThe ransomware uses AES encryption and adds one of more than 20 different extensions to infected files. The malicious software was discovered at the end of 2017 with new variants appearing on the threat landscape throughout 2018 and into 2019. The ransom note for some variants report to give the victim a 50% discount if the threat actor is contacted via email within 72 hours.
Ryuk – RansomwareThe ransomware uses AES and RSA encryption and demands between 15 and 50 Bitcoin for the decryption key. The malicious software kills hundreds of processes and services and also encrypts not only local drives but also network drives. The attacks are reported to be targeted at organizations that are capable of paying the large ransom demanded. Variants found in mid 2019 will not infect the system if the computers IP address or computer name is part of a blacklist.
GandCrab 5 – RansomwareThe ransomware appends random extensions to encrypted files and directs the victim to an html file for instructions on how to decrypt infected files. The threat actor demands the ransom be paid in either Bitcoin or DASH. GandCrab 5 also scans network shares and mapped drives to find files to encrypt. The threat actors behind the ransomware use a variety of infection vectors including PowerShell, Botnets, Exploit Kits, Trojanized Programs, SpearPhishing, and Remote Desktop.
MegaCortex – RansomwareThe ransomware appends “.aes128ctr” to infected files and requires the victim to email the threat actor for the decryption key. The malware is affecting companies in multiple countries by using the companies Microsoft Windows domain controllers to distribute the ransomware to all workstations.
Sodinokibi – RansomwareThe ransomware appends a random extension to encrypted files and reports to double the price of the ransom if not paid on time. The malware is actively being distributed in the wild through Managed Service Providers, taking advantage of server flaws, spam campaigns, and through exploit kits.
LooCipher – RansomwareThe ransomware demands 300 EUR for the decryption key and will delete the key if the ransom is not paid within 5 days. The malware is distributed in a malicious Microsoft Word document and appends the .lcphr extension to encrypted files.

You may also like...

Leave a Reply

Your email address will not be published. Required fields are marked *