The Players of Ransomware

Hacker, hacker hacks network, hacker on a dark background. Dangerous Hooded Hacker Breaks into Government Data Servers

In cybercrime today, ransomware is the star of the show. A complex web of influences and an unexpected wealth of opportunity has given cybercriminals a golden ticket to profit from ransomware attacks – and they’re using this to their advantage.

 

Meet the Players:

  • Crypto Ransomware : Crypto ransomware encrypts data, like files on a computer, making it inaccessible. Cybercriminals then offer to sell the victim the decryption key. This type of ransomware does not impact the machines it is used on, just the data.
  • Locker Ransomware: Locker ransomware makes devices, like computers or machinery, unusable. Cybercriminals will offer to unlock the affected devices on payment of the ransom. This type of ransomware is typically used in infrastructure attacks or attacks against manufacturing targets.
  • SCAREWARE: Scareware makes the users freak out by prompting a message which will trick them into downloading malware. The attackers often use a pop-up or a false button, displaying messages such as "Your PC is slow. Speed up now.", or "Attackers can see your IP, Protect it Now."
  • LEAKWARE:In Leakware, attackers will threaten the users that their information will be released in public domains. Their main targets are banks and nationalized institutions that holds confidential or sensitive data.
  • RANSOMWARE As a SERVICE (RaaS): RaaS is where attackers embrace RaaS-like business model to carry execute ransomware attacks.

 

Ransomware Sub-types:

  1. Double Extortion: In a double-extortion ransomware attack, cybercriminals deploy ransomware that creates two adverse effects for the victim — encrypting data and locking machines at the same time. The gang then demands payment to unlock machines and decrypt data.
  2. Triple Extortion: This up-and-coming variety of ransomware causes immense trouble for the victims and has the potential to earn cybercriminals high profits. Going one step further than a double-extortion attack, this variety produces three adverse effects for its target.

 

Protecting businesses from cybercriminals must be a top goal of any security plan. One of the best ways to do that is by increasing cybersecurity awareness with a powerful training solution. Paul Jackson, CEO/Cybersecurity Specialist is heading our cybersecurity team to provide and reduce the threat from the attackers.

By allowing our team of professionals to conduct a Cybersecurity Risk Assessment on your business, we can identify current risks or threats to your information systems and take action before anything happens.

Plan your cybersecurity strategy: CONTACT US TODAY TO LEARN MORE!