Types of Ransomware Attacks

Types of Ransomware Attacks

There are many types of cybercrime over there in the internet world and ransomware is one of them. Ransomware has been a constant threat to organizations across industries for many years. in our previous article, we had discussed ransomware attacks in detail. If you are interested then check it out.  In this article, we are going to discuss-


Types of Ransomware Attacks

There are two main types of ransomware.


1. Locker ransomware

2. Crypto ransomware


Locker ransomware

Locker ransomware is a computer virus that infects a PC and locks the user's files, preventing access to data and files located on the PC until a ransom or fine is paid. The locker demands payment of $xxx via Perfect Money or a QIWI Visa Virtual Card number to unlock the files.


Crypto ransomware

Crypto ransomware is one of those forms of malware that attacks the computer by restricting the user's access to the files stored in the computer. The malware displays an on-screen alert advising the user to pay a certain amount to gain access to the victims' files via bitcoin.


Now you understand the two main types of ransomware. Let's explore 10 famous ransomware examples to help you understand how different and dangerous each type can be.


1. Locky

2. WannaCry

3. Bad Rabbit

4. Ryuk

5. Troldesh

6. Jigsaw

7. CryptoLocker

8. Petya

9. GoldenEye

10. GandCrab



Locky is the latest in a series of ransomware that has hit cyberspace over the past few months. Computer Emergency Response Team (CERT) India had issued an alert on Lockie last week. It is also ransomware that spreads through spam mail that has subject lines like "Please print" or "Photos".


Malware is downloaded to the system after it is opened by the recipient and it encrypts the data on the system to access these files until you pay the ransom in cryptocurrencies such as bitcoin.



It has been reported that a new ransomware named "WannaCry" is a worldwide cyberattack by the WannaCry ransomware cryptoworm. The attack, which began on 12 May 2017 and has been described as largely unusual, has infected more than 230,000 computers in more than 150 countries.


WannaCry targets computers running Microsoft Windows operating systems and encrypts files on infected Windows systems. After encryption, they demand a ransom payment of US $xxx in bitcoin cryptocurrency, and it will double if you do not pay that amount within 3 days and even after seven days if the payment is not made, So they claim to delete encrypted files.


Bad Rabbit

2017 has already seen a slew of ransomware outbreaks, such as Wannacry and NotPetya, and as we neared the end of the year, another ransomware was added to the list. Bad Rabbit, so named because the authors named the page where they demand a ransom with bitcoin details.


Initial infection reports suggest that the targeted geographic areas are mostly Russia and Ukraine, with reports scattered around Turkey, Bulgaria, Poland, and South Korea. Notable disruptors included major Russian news publishers and the ministries of Ukraine, Odesa airport, Kyiv metro, and infrastructure.



Ryuk is a type of ransomware known to target large, public-unit Microsoft Windows cyber systems. It typically encrypts the data on an infected system, rendering the data untraceable until a ransom is paid in untraceable bitcoins. Ryuk is believed to have been used by two or more criminal groups, most likely Russians, that target organization rather than individual consumers.



In 2015, the Troldesh ransomware attack occurred and was spread through spam emails containing infected links or attachments. Interestingly, the Troldesh attackers contacted the victims directly over email to demand a ransom. Cybercriminals also negotiated discounts for victims, with whom they made rapport, a rare occurrence indeed.


This story is the exception, not the rule. It is never a good idea to interact with cybercriminals. Avoid paying the ransom demanded at all cost as doing so encourages this form of cybercrime.



Jigsaw ransomware is a form of encrypting malware. It was made in 2016. It was initially titled "Bitcoin Blackmailer", but later became known as Jigsaw due to featuring an image of Billy the Puppet from the Saw film franchise. The malware encrypts computer files and gradually removes them until a ransom is paid to decrypt the files.



Crypto Locker is a virus. It is a ransomware Trojan horse that targets computers running Microsoft Windows. Its first existence became known on 5 September 2013. It was propagated through infected email attachments and through the existing Gameover Zeus botnet.


An estimated 500,000 computers were affected. Law enforcement agencies (LEAs) and security companies eventually managed to seize control of a worldwide network of hijacked home computers that were used to spread CryptoLocker.



In March 2016, the Petya ransomware was first discovered and like most malware, it was mainly spread through email phishing attacks. After a user is infected, the ransomware will encrypt the data files on the system and then present users with a message alerting them to the encryption, demanding payment in bitcoins to restore the files, and how bitcoins are paid. Provide, will provide instructions on this.


Once the ransom is paid, attackers usually (but not always) send the victim a decryption key so that they can restore their files.



Like Petya, GoldenEye encrypts the entire hard disk drive and denies the user access to the computer. However, unlike Petya, there is no solution to help victims retrieve the decryption keys from the computer.


Additionally, after the encryption process is complete, the ransomware contains a special routine that forcefully crashes the computer to trigger a reboot that renders the computer unusable until the $xxx ransom is paid.



GANDCRAB is a very dangerous ransomware that will encrypt all the files on the computer and demand a ransom to decrypt them. Thousands of users infected their computers with this terrible encoder. GandCrab is one of the biggest ransomware threats ever, so it is so important to protect yourself with proper anti-virus software or do some backup of your data.


I hope you like the article. If you like it share it with your friends and family and also share your thoughts and experience in the comment section below.  

Leave a Reply

Also Read

Join GraspHack Family!

We will never spam you.

Be a part of our ever growing community.