What Is Ransomware ? Different Types Of Ransomware .

details about Ransomware

 What Is Ransomware  ?

Ransomware is a type of malicious software from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid. While some simple ransomware may lock the system in a way which is not difficult for a knowledgeable person to reverse, more advanced malware uses a technique called cryptoviral extortion, in which it encrypts the victim's files, making them inaccessible, and demands a ransom payment to decrypt them. In a properly implemented cryptoviral extortion attack, recovering the files without the decryption key is an intractable problem – and difficult to trace digital currencies such as Ukash and Bitcoin are used for the ransoms, making tracing and prosecuting the perpetrators difficult.


Users may encounter this threat through a variety of means. Ransomware can be downloaded onto systems when unwitting users visit malicious or compromised websites. It can also arrive as a payload either dropped or downloaded by other malware. Some ransomware are known to be delivered as attachments from spammed email, downloaded from malicious pages through malvertisements, or dropped by exploit kits onto vulnerable systems.
Related Articles :-
What Is Computer Virus ? Different Types Of Computer Virus .  
 What Is Trojan Horse ? Types Of Trojan Horse .
What Is Computer Worm ? Different Types Of Computer Worms . 
What Is Spyware ? Types Of Spyware and Effects Of Spyware .

Once executed in the system, ransomware can either lock the computer screen, or, in the case of crypto-ransomware, encrypt predetermined files. In the first scenario, a full-screen image or notification is displayed on the infected system's screen, which prevents victims from using their system. This also shows the instructions on how users can pay for the ransom. The second type of ransomware prevents access to files to potentially critical or valuable files like documents and spreadsheets.




 Different Types Of Ransomware :-

Wannacry :-

WannaCry is the most recent (last May) and the largest Ransomware attack to date. It infected more than 100,000 computers by taking advantage of an unpatched Microsoft Windows vulnerability.

CRYPTO Ransomware :-

Crypto ransomware is as simple as weaponizing strong encryption against victims to deny them access to those files. Once the ransomware infiltrates the victim's device, the malware silently identifies and encrypts valuable files. Only after successfully accessing to target files has been restricted does the ransomware ask the user for a fee to access their files. Without the decryption key held by the attackers, or in some cases, a vendor decryption solution, the user loses access to the encrypted files. Crypto ransomware often includes a time limit. Some variants of crypto ransomware even provide users with a site to purchase Bitcoins and articles explaining the currency.



LOCKER Ransomware :-

This is also known as computer locker. This ransomware doesn't encrypt the files of the victim but instead, it denies the access to the device. This locks the device's user interface and then demands the victim for the ransom. This ransomware will leave the victim with very few capabilities such as allowing the victim just to communicate with the attacker and to pay the ransom.

Locky :-

Locky has first seen arriving as a macro in a Word document, and then spotted being spread via Adobe Flash and Windows Kernel Exploits. Locky ransomware is known for deleting shadow copies of files to make local backups useless. Cryptowall – Its latest version is known for encrypting also the names of the encrypted files making it harder for the victim to know what has been encrypted. It is spread in many ways such as attachments in phishing emails from financial institutions. The ransom demanded is usually $700, doubling after about a week to $1400.

Cerber :-

Cerber is the world’s biggest ransomware-as-a-service scheme, it isis a franchise scheme, with its developer recruiting affiliates who spread the malware for a cut of the profits. Cerber was used in an attack that potentially exposed millions of Microsoft Office 365 users to the infection.

Related Articles :- 
 What Is Adware ? Different Types Of Adware . 
What Is Rootkit ? Different Types Of Rootkits .What Is Ransomware ? 
Different Types Of Ransomware . 
What Is Scareware ? Effects Of Scareware .

Crysis :-

 This form of ransomware can encrypt files on fixed, removable, and network drives and it uses strong encryption algorithms and a scheme that makes it difficult to crack within a reasonable amount of time.

CryptoLocker :-

 Ransomware has been around in some form or another for the past two decades, but it really came to prominence in 2013 with CryptoLocker. The original CryptoLocker botnet was shut down in May 2014, but not before the hackers behind it extorted nearly $3 million from victims. Since then, hackers have widely copied the CryptoLocker approach, although the variants in operation today are not directly linked to the original. The word CryptoLocker, much like Xerox and Kleenex in their respective worlds, has become almost synonymous with ransomware.



NotPetya :-

 Initial reports categorized NotPetya as a variant of Petya, a strain of ransomware first seen in 2016. However, researchers now believe NotPetya is instead a malware known as a wiper with a sole purpose of destroying data instead of obtaining a ransom.

TeslaCrypt :-

TeslaCrypt is another new type of ransomware on the scene. Like most of the other examples here, it uses an AES algorithm to encrypt files. It's typically distributed via the Angler exploit kit specifically attacking Adobe vulnerabilities. Once a vulnerability is exploited, TeslaCrypt installs itself in the Microsoft temp folder.

TorrentLocker :-

TorrentLocker is typically distributed through spam email campaigns and is geographically targeted with email messages delivered to specific regions. TorrentLocker is often referred to as CryptoLocker, and it uses an AES algorithm to encrypt file types. In addition to encoding files, it also collects email addresses from the victim’s address book to spread malware beyond the initially infected computer—this is unique to TorrentLocker.

ZCryptor :-

ZCryptor is a self-propagating malware strain that exhibits worm-like behavior, encrypting files and also infecting external drives and flash drives so it can be distributed to other computers.

COMMENTS

Name

Career,22,Digital,15,Education,5,Festival Wishes,9,Govt. Jobs,11,Smartphone Specifications,15,Tech News,22,Technology,35,
ltr
item
Education And Technology: What Is Ransomware ? Different Types Of Ransomware .
What Is Ransomware ? Different Types Of Ransomware .
details about Ransomware
Education And Technology
http://www.educationaltechs.com/2017/08/what-is-ransomware-different-types-of-ransomware.html
http://www.educationaltechs.com/
http://www.educationaltechs.com/
http://www.educationaltechs.com/2017/08/what-is-ransomware-different-types-of-ransomware.html
true
7675612019918325525
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS CONTENT IS PREMIUM Please share to unlock Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy