Ransomware Attacks and Types
Dynamix Solutions
Ransomware Attacks and Types
Did you know that 39% of Canadian businesses suffered a ransomware attack last year, while 65% anticipate being subject to a ransomware attack in the future? Even if your business doesn’t know what ransomware is, you need to watch out. It’s fast becoming one of the most prevalent threats to organizations large and small.
Here’s everything you need to know to protect yourself.
What is ransomware?
Ransomware is a form of malicious software that is often delivered by email or online advertisements that have been corrupted. Once in your system, ransomware works by locking you out of your files and data, rendering them inaccessible.
You can only restore access by paying a ransom – which is usually somewhere in the tens or thousands of dollars.
Common Ransomware Types
Ransomware takes many forms. There are numerous types that work in slightly different ways. Here are the most common.
Locker Ransomware
Locker ransomware blocks a device from functioning normally. You’ll be unable to move your mouse or press your keyboard in a meaningful way. The only thing you will be able to do is interact with the screen that has the ransom demand on it, so you can make a payment. Otherwise, the device doesn’t operate at all.
The only saving grace about locker ransomware is that it locks you out of your files, rather than encrypting and deleting them. This means that, if you store your files securely in the cloud, you’ll be able to access them on another device.
Crypto-Ransomware
Contrastingly, crypto-ransomware encrypts your data so that you can’t access it. You can still use your computer, but all your important files will be off-limits.
Often, this ransomware features a countdown clock, threatening to delete your information if you don’t pay the ransom before the clock strikes zero.
Scareware
Scareware is a manipulative form of malware that masquerades as a pop-up ad. The ad encourages the user to download fake anti-virus software urgently to protect their computer.
Ironically, by clicking on the link, the user inadvertently deploys ransomware onto their computer, which then encrypts their data until a ransom is paid.
Leakware
In a leakware attack, the attacker responsible for the incident threatens to publish the confidential data compromised, while also encrypting the files. This puts extra pressure on the victim to pay the ransom, for fear that their sensitive information could be exposed to the public.
Ransomware As a Service (RaaS)
Ransomware as a service is essentially the democratization of ransomware. It’s a popular business model on the dark web, where cyber-criminals sell ready-to-go ransomware to other nefarious individuals.
The buyers don’t need to do any coding or hard work themselves. The malicious software is ready to be deployed and used against victims.
Common Examples Of Ransomware
Now that we know a little more about the common types of ransomware, we can dive into specific strains that have made an impact on organizations over the last few years.
Bad Rabbit
Bad Rabbit is a ransomware strain that wreaked havoc across Eastern Europe in 2017, harming over 200 organizations. It’s thought that Bad Rabbit was meant to disrupt Russian media agencies, but a whole host of corporate organizations in Eastern Europe and Japan were also impacted.
Cerber
Cerber ransomware has been around since 2016. Most recently, it hit the headlines for impacting Confluence and GitLab servers at the end of last year.
In a Cerber ransomware attack, the victim usually receives a phishing email with a malicious attachment. Once in their systems, Cerber encrypts access to the victim’s data until a ransom is paid.
CryptoLocker
CryptoLocker is an infamous form of malware. Once executed, it encrypts files on devices and the network, holding them for ransom until a sum is paid. In late 2013, this ransomware harmed numerous computers running Microsoft Windows in several organizations.
CryptoWall
CryptoWall is an extremely sophisticated ransomware variant. It goes beyond encrypting your files and asking you to pay a ransom. Instead, it hides in your device and steals your data, passwords and bitcoin wallets. From there, it locks your files in such a way that the only way to get them back is through an encryption key.
CrySIS/Dharma
This form of malware is specifically aimed at the Windows family and businesses. It’s usually delivered by phishing email.
CTB-Locker
CTB-Locker is a ransomware variant that works by locking files on the victim’s hard disk before requesting a ransomware payment. This variant was particularly prominent in 2015, and is slightly less common today.
GoldenEye
If you’re a Bond fan, you might be thinking this name sounds familiar. The hacking group responsible for GoldenEye are indeed James Bond fans too. Nevertheless, this is an asty piece of malware.
It works by blending two attack strategies. Firstly, two viruses are downloaded in tandem, called Mischa and Petya. Then, they work to encrypt data on the victim’s device and network, and demand a payment to decrypt the data.
Jigsaw
Jigsaw is a variant of encryption ransomware malware dating back to 2016. It was initially known as “BitcoinBlackmailer”. However, when cybercriminals started using an image of Billy the Puppet from Saw in their attacks, the malware was renamed to Jigsaw.
LockerGoga
LockerGoga is a rather disruptive form of ransomware that industrial organizations need to be aware of. It works by shutting down computers to the point where they are inaccessible and is crippling for victims. In fact, it’s often hard for victims to get to the screen necessary to pay the ransom.
Locky
Locky ransomware comes in the form of an email claiming to be an invoice. When the victim clicks the link, they’ll open a malicious Microsoft Word document embedded with ransomware that encrypts their files.
Petya
Petya is another ransomware that targets Microsoft. It infects the master boot record of a device and then encrypts the hard drive’s file system table. This prevents Microsoft Windows from loading up. Instead, the victim will see a screen that demands payment in bitcoin to regain access. Petya is the ransomware responsible for the huge cyber-attack on Ukraine in 2017.
Spider
Spider ransomware attacks begin with a phishing email. Once the victim clicks the associated link, the malware deploys and encrypts access to data. In a twist, Spider only gives victims 96 hours to pay the ransom or their files are obliterated for good.
WannaCry
Perhaps the most infamous ransomware variant, WannaCry disabled thousands of organizations in 2017. This attack, in particular, spread through EternalBlue, an exploit designed by the United States National Security Agency. While Microsoft had released a patch for the exploit, many organizations around the globe had failed to use it.
ZCryptor
This malware is part ransomware, part worm. It’s unique because it encrypts files while aso stealthily propagating to other computers and networks without the need for further spamming or exploits.
Ransomware Protection Tips
With so many variants out there, protecting against ransomware can seem overwhelming. However, there are some simple things you can do to bolster your defenses.
First up, make sure you always backup your data. That way, if you’re subject to an attack, you’ll be able to recover your files without paying a dime. Secondly, a huge cause of ransomware attacks is user error, so make sure you’re training your employees about the risks of phishing emails and malicious online adverts.
We can help you protect against ransomware
Running your business and staying on top of cybersecurity threats doesn’t have to be a challenge. Work with a reputable local managed IT service provider like us, and we’ll ensure you stay secure from today’s top ransomware threats.
Dynamix Solutions is a Toronto managed IT services provider that provides cyber security and managed IT services in Calgary.
This post Ransomware Attacks and Types first appeared on Dynamix Solutions and was written by James