{"id":2187,"date":"2019-06-24T20:25:30","date_gmt":"2019-06-24T11:25:30","guid":{"rendered":"http:\/\/52.45.169.28\/?p=2187"},"modified":"2022-12-06T22:40:02","modified_gmt":"2022-12-06T13:40:02","slug":"ransomware-examples","status":"publish","type":"post","link":"https:\/\/www.filingcloud.com\/en\/blog\/ransomware-examples\/","title":{"rendered":"The 10 Biggest Ransomware Examples You Should Know About!"},"content":{"rendered":"<h2><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/i2.wp.com\/52.45.169.28\/wp-content\/uploads\/2019\/06\/codes-coding-hacker-97077-1024x683.jpg?w=100%25\" sizes=\"(max-width: 800px) 100vw, 800px\" srcset=\"https:\/\/i2.wp.com\/www.filingbox.com\/wp-content\/uploads\/2019\/06\/codes-coding-hacker-97077.jpg?resize=1024%2C683&amp;ssl=1 1024w, https:\/\/i2.wp.com\/www.filingbox.com\/wp-content\/uploads\/2019\/06\/codes-coding-hacker-97077.jpg?resize=300%2C200&amp;ssl=1 300w, https:\/\/i2.wp.com\/www.filingbox.com\/wp-content\/uploads\/2019\/06\/codes-coding-hacker-97077.jpg?resize=768%2C512&amp;ssl=1 768w, https:\/\/i2.wp.com\/www.filingbox.com\/wp-content\/uploads\/2019\/06\/codes-coding-hacker-97077.jpg?w=1600 1600w, https:\/\/i2.wp.com\/www.filingbox.com\/wp-content\/uploads\/2019\/06\/codes-coding-hacker-97077.jpg?w=2400 2400w\" alt=\"The 10 Biggest Ransomware Examples You Should Know About!\" width=\"1000\" height=\"667\"><\/h2>\n<h2>&nbsp;<\/h2>\n<h2>Ransomware Examples<\/h2>\n&nbsp;\n\n<!-- \/wp:post-content -->\n\n<!-- wp:paragraph -->\n\nRansomware attacks are a continual threat to all who use the internet. They can range from being difficult to deal with, to a catastrophic disaster.\n\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n\nAs long as people continue to pay ransoms, attackers will continue to use ransomware.\n\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n\nIt doesn&#8217;t look like the ransomware business is going to slow down any time soon. Ransomware attacks have increased by <a href=\"https:\/\/phoenixnap.com\/blog\/ransomware-statistics-facts\">over 97%<\/a> in the past two years.\n\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n\nWe&#8217;ve put together a list of some of the biggest and most well-known examples of ransomware.\n\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n\nSome gained far more publicity than others in the cybersecurity world.\n\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n\nIf you&#8217;re unfamiliar with what ransomware is, you can read our definition <a href=\"https:\/\/www.filingcloud.com\/2019\/06\/13\/ransomware\">here<\/a>.\n\n&nbsp;\n\n<!-- \/wp:paragraph -->\n\n<!-- wp:heading -->\n<h2>The 10 Biggest Ransomware Examples You Should Know About!<\/h2>\n&nbsp;\n\n<!-- \/wp:heading -->\n\n<!-- wp:heading {\"level\":3} -->\n<h3>1. Cryptolocker<\/h3>\n<!-- \/wp:heading -->\n\n<!-- wp:paragraph -->\n\nThe first type of ransomware example is Cryptolocker.\n\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n\nIt is most commonly known for encrypting files and demanding payment to decrypt and unlock your data.\n\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n\nThis type of malware can encrypt anything on your hard drives, USB sticks, shared network drives and files stored in the cloud.\n\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n\nThis type of ransomware uses a &#8220;two key&#8221; approach, one public and one private key.\n\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n\nThe attacker encrypts your data using the public key and uses the unique private key to unlock your data once you&#8217;ve paid the ransom.\n\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n\nCryptolocker has only targeted computers running windows so far, so Mac users are safe for now.\n\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n\nYou&#8217;ll know if you&#8217;re a victim of cryptolocker as warning pop-ups will be displayed on your screen.\n\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n\nThese will indicate that your data will be destroyed if you do not pay a ransom.\n\n<!-- \/wp:paragraph -->\n\n<!-- wp:heading {\"level\":3} -->\n<h3>2. Bad Rabbit<\/h3>\n<!-- \/wp:heading -->\n\n<!-- wp:paragraph -->\n\nBad Rabbit is a type of ransomware that disguises itself as an Adobe Flash player update or installer.\n\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n\nWhen you browse the internet or a specific website, Bad Rabbit will present itself by flashing up that there&#8217;s a new version of Adobe available to download.\n\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n\nOnce you take the bait and downloaded it, Bad Rabbit will install itself on your machine and begin to wreak havoc.\n\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n\nIt will encrypt your hard drive and files, prevent windows from starting up properly and lock your computer entirely.\n\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n\nUsually, the ransom note that appears on your screen will give you 40 hours to pay the ransom in Bitcoin.\n\n<!-- \/wp:paragraph -->\n\n<!-- wp:heading {\"level\":3} -->\n<h3>3. Cerber<\/h3>\n<!-- \/wp:heading -->\n\n<!-- wp:paragraph -->\n\n<a href=\"https:\/\/www.microsoft.com\/security\/blog\/2017\/01\/30\/averting-ransomware-epidemics-in-corporate-networks-with-windows-defender-atp\/\">Cerber<\/a> is an interesting example of ransomware as it&#8217;s pretty much an affiliate program for ransomware criminals.\n\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n\nAnyone in the world has the option to buy and deploy it for roughly 40% of the paid ransom profits.\n\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n\nSimilar in it&#8217;s requests to other types of ransomware, Cerber encrypts your files and demands payment in exchange for granting access to your files.\n\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n\nHowever, Cerber also works even if you are not online, so just unplugging your computer will not do anything to prevent the infection.\n\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n\nIt will normally be delivered to users by email which includes an infected Microsoft Office document.\n\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n\nOpening the document launches the malware, and within a few minutes, it will work its way through your files and encrypt and rename everything.\n\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n\nIt will lie dormant until it&#8217;s work is done and then present itself as a desktop background or note in an encrypted file.\n\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n\nCerber accounted for <a href=\"https:\/\/www.varonis.com\/blog\/cerber-ransomware\/\">26% of all ransomware infections<\/a> at its peak in early 2017.\n\n<!-- \/wp:paragraph -->\n\n<!-- wp:heading {\"level\":3} -->\n<h3>4. GoldenEye<\/h3>\n<!-- \/wp:heading -->\n\n<!-- wp:paragraph -->\n\nGoldenEye comes from the same family as Petya and MISCHA, however, it goes one step further by encrypting your NTFS structures.\n\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n\nIt is distributed using a spam email message that includes an infected document, often an MS Excell file.\n\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n\nOnce the file is opened, a pop up will show up on screen requesting specific actions.\n\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n\nIf you follow along and enable those actions and permissions, the ransomware will download and begin to infect your system.\n\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n\nIt will automatically reboot your computer, and then greet you with a notice of instructions on how to pay the ransom.\n\n<!-- \/wp:paragraph -->\n\n<!-- wp:heading {\"level\":3} -->\n<h3>5. Dharma<\/h3>\n<!-- \/wp:heading -->\n\n<!-- wp:paragraph -->\n\nSimilar to the first four ransomware examples, Dharma encrypts your data and demands a ransom.\n\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n\nIt&#8217;s a variant of CrySIS and is delivered manually by Remote Desktop Protocol (RDP) services. Attackers then brute force the password to gain access.\n\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n\nInstead of pop-ups or on-screen messages, Dharma leaves a note in the encrypted text files which includes a contact email address to discuss payment instructions.\n\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n\nSince it&#8217;s release in 2016, there have been around 15-20 different variants of the ransomware.\n\n<!-- \/wp:paragraph -->\n\n<!-- wp:heading {\"level\":3} -->\n<h3>6. Jigsaw<\/h3>\n<!-- \/wp:heading -->\n\n<!-- wp:paragraph -->\n\nJigsaw first started to surface around March 2016.\n\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n\nIt also encrypts your files and demands a ransom, but it puts you under even more pressure by adding time to the equation.\n\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n\nOnce the malware is deployed, it will start encrypting your files and then deleting your files every hour within the first 24 hours.\n\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n\nAfter that, on the next day, it will delete even more files until eventually deleting hundreds or thousands of your files until you pay the ransom.\n\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n\nIf you think that&#8217;s bad enough, then if you even try to reboot your computer or figure out a way to remove the ransomware, Jigsaw will delete thousands of files as a punishment!\n\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n\nOnce your infected, the countdown will begin. So, if you choose to not pay the $100 &#8211; $150 ransom within the first hour, then all your files will start being deleted.\n\n<!-- \/wp:paragraph -->\n\n<!-- wp:heading {\"level\":3} -->\n<h3>7. WannaCry<\/h3>\n<!-- \/wp:heading -->\n\n<!-- wp:paragraph -->\n\nThe next example of ransomware is the infamous WannaCry.\n\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n\nProbably the most well-known example of ransomware to date, WannaCry is wormable ransomware that spreads independently by exploiting Windows operating system vulnerabilities.\n\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n\nIt was first detected in May 2017 and has is believed to have infected over 160,000 unique IP addresses.\n\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n\nOnce it&#8217;s on your system, WannaCry will encrypt your files and hard drive, demanding a ransom of between $300 &#8211; $600 in bitcoin.\n\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n\nIt should be noted that only a few people were successfully given decryption keys to access their data.\n\n<!-- \/wp:paragraph -->\n\n<!-- wp:heading {\"level\":3} -->\n<h3>8. Petya<\/h3>\n<!-- \/wp:heading -->\n\n<!-- wp:paragraph -->\n\nPetya arrived on the ransomware scene in March 2016.\n\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n\nIt&#8217;s delivered like many of the previously mentioned ransomware examples &#8211; attached to an email.\n\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n\nThe email will normally contain two files, one of which will include the malware. Once you&#8217;ve clicked that file, you&#8217;re unknowingly agreeing to the Windows User Access Control warning, telling you changes are going to be made to your computer.\n\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n\nPetya will then reboot your system and display a standard Windows CHKDSK screen to you. Once this is done, the malware will be actively working in the background. And instead of just encrypting files one by one, Petya will infect and encrypt your entire system.\n\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n\nAt this point, Petya will demand a ransom in bitcoin to decrypt your hard drive.\n\n<!-- \/wp:paragraph -->\n\n<!-- wp:heading {\"level\":3} -->\n<h3>9. GandCrab<\/h3>\n<!-- \/wp:heading -->\n\n<!-- wp:heading {\"level\":3} -->\n<h3>10. SamSam<\/h3>\n<!-- \/wp:heading -->\n\n<!-- wp:paragraph -->\n\nAt FilingCloud, we firmly believe that adding the right prevention solution to your workflow is the best way to protect yourself from ransomware.\n\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n\nClick <a href=\"https:\/\/filingcloud.com\/en\/filingbox\/\">here<\/a> to organise a free demo of the ultimate ransomware prevention solution.\n\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n\nFor more details about <a href=\"https:\/\/filingcloud.com\/en\/filingbox\/\">FilingBox,<\/a> contact us at <a href=\"mailto:sales@filingbox.com\">sales@filingbox.com<\/a>&nbsp;or call us on +1-813-445-7472.","protected":false},"excerpt":{"rendered":"<p>&nbsp; Ransomware Examples &nbsp; Ransomware attacks are a continual threat to all who use the internet. They can range from being difficult to deal with, to a catastrophic disaster. As long as people continue to pay ransoms, attackers will continue to use ransomware. It doesn&#8217;t look like the ransomware business is going to slow down [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":2192,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[10],"tags":[],"class_list":["post-2187","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-industry-news"],"jetpack_featured_media_url":"https:\/\/www.filingcloud.com\/wp-content\/uploads\/2019\/06\/codes-coding-hacker-97077.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.filingcloud.com\/en\/wp-json\/wp\/v2\/posts\/2187","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.filingcloud.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.filingcloud.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.filingcloud.com\/en\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/www.filingcloud.com\/en\/wp-json\/wp\/v2\/comments?post=2187"}],"version-history":[{"count":17,"href":"https:\/\/www.filingcloud.com\/en\/wp-json\/wp\/v2\/posts\/2187\/revisions"}],"predecessor-version":[{"id":8333,"href":"https:\/\/www.filingcloud.com\/en\/wp-json\/wp\/v2\/posts\/2187\/revisions\/8333"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.filingcloud.com\/en\/wp-json\/wp\/v2\/media\/2192"}],"wp:attachment":[{"href":"https:\/\/www.filingcloud.com\/en\/wp-json\/wp\/v2\/media?parent=2187"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.filingcloud.com\/en\/wp-json\/wp\/v2\/categories?post=2187"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.filingcloud.com\/en\/wp-json\/wp\/v2\/tags?post=2187"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}