Ransomware is malicious software that restricts access to a computer system or data, demanding a ransom for release. Cybercriminals constantly evolve ransomware tactics to exploit vulnerabilities and maximize their impact. The most common types of ransomware include:
Each type of ransomware presents different challenges and requires specific security measures to protect against it.
Ransomware is a formidable threat in the digital age which manifests in various forms, each employing distinct strategies to extort victims. Encrypting Ransomware, Locker Ransomware, and Master Boot Record (MBR) Ransomware stand out for their unique approaches to hijacking user data and systems.
Even as malicious actors embrace novel and diverse new attack techniques, encrypting ransomware and locker ransomware remain the two main types of ransomware by far. The five most common types of ransomware, each with its unique mode of operation, are:
This type of ransomware encrypts the victim's files, making them inaccessible. The attacker then demands a ransom, typically in cryptocurrency, for the decryption key. Crypto ransomware targets individual files or entire systems, and the encryption is often strong enough that decryption without the key is impractical. It's spread through various methods, including phishing emails and malicious downloads.
Unlike Crypto Ransomware, locker ransomware does not encrypt files. Instead, it locks the victim out of their operating system, preventing access to files or applications. The ransom demand is displayed on the lock screen, often with a countdown to increase urgency. Locker ransomware is usually distributed through exploit kits and infected websites.
This type includes rogue security software and tech support scams. It bombards the user with false alarms or a fake detection of viruses or issues on the computer, demanding money to resolve these fabricated problems. While it may not restrict access to files or systems, its persistent and alarming notifications can be disruptive. Scareware often makes its way onto computers through pop-up ads or user-initiated software downloads.
This ransomware threatens to publish sensitive personal or organizational data online unless a ransom is paid. The effectiveness of Doxware lies in the fear of reputational damage or legal consequences from the data release. This type of ransomware can infiltrate systems similarly to other malware, including through phishing attacks or security vulnerabilities.
The RaaS model allows individuals to lease ransomware from developers, eliminating the need for technical expertise in creating the malware. The affiliate then conducts the attack, sharing profits between the developer and the affiliate. This model has made ransomware attacks more accessible and increased their frequency. RaaS is often distributed via dark web marketplaces, making it accessible to many cybercriminals.
It is essential to move toward a prevention-based platform and away from simple detection and remediation after infection. This approach requires a fundamental shift toward proactive, AI-powered security that is automated across the network and endpoints.
Implementing such a system involves using advanced tools and technologies, including machine learning, to stop unknown and zero-day threats like ransomware preemptively. Coordinating endpoint prevention and network security, malware analysis and threat management solutions is crucial for closing security gaps and stopping dangerous variants.
A multi-faceted response and recovery approach for businesses to protect themselves against ransomware is highly recommended.
Effectively managing the attack surface enhances security by having complete network traffic visibility and blocking any unknown or potentially high-risk traffic. Controls based on applications and users are essential to limit access to SaaS-based tools, especially for employees who do not require them for their work.
It is also essential to control dangerous file types associated with recent attacks and align the endpoint policy with the level of risk, thus preventing noncompliant endpoints from connecting to critical network resources.
Stopping known exploits, malware, and command-and-control traffic and blocking access to malicious and phishing URLs is vital. Scanning for known malware in SaaS-based applications is crucial because these platforms are a new path for malware delivery. Additionally, known malware and exploits on endpoints should be blocked.
The ability to detect and analyze unknown threats in files and URLs is crucial. As new files are submitted, they should be detonated, analyzed, and scrutinized for malicious behavior. Updating protections across the organization to prevent previously unknown threats is a key step.
Contextualizing threats improves proactive protections and mitigation. Once these threats or trends of suspicious behavior have been identified, blocking unknown malware and exploits on the endpoint is essential.
Ransomware has evolved significantly, reflecting broader trends in cybercrime and technology. Today, threat actors are increasingly employing persistent extortion techniques to gain leverage over targeted organizations and accomplish their goals.
While much attention has been paid to ransomware in recent years—the malware itself—modern threat actors increasingly use cloud-based Ransomware as a Service tool and additional extortion techniques to coerce targets into paying. Sometimes, these ransomware groups dispense with ransomware and practice extortion independently.
The earliest forms of ransomware were relatively primitive. In the late 1980s, the AIDS Trojan was one of the first known ransomware, which involved physically mailing the ransom payment. These early ransomware types used simple locking mechanisms and often demanded payment via snail mail or wire transfers.
A significant evolution occurred with the advent of encryption-based ransomware. This type encrypts the victim's files, making them inaccessible without a decryption key. Notable examples include GpCode, CryptoLocker, and WannaCry. Payment was typically demanded in Bitcoin, reflecting the rise of cryptocurrencies. This era marked a shift to more sophisticated attack techniques and targeted larger organizations, causing widespread disruption.
The ransomware landscape further evolved with RaaS, where ransomware developers lease their software to others in exchange for a portion of the ransom. This model has lowered the entry barrier for cybercriminals. The tactic of double extortion emerged, where attackers not only encrypt data but also threaten to release it publicly unless the ransom is paid. This approach compounds the impact on victims, including reputational damage and regulatory penalties.
More recently, attackers are moving away from widespread, indiscriminate attacks to highly targeted ones, often preying on large corporations, government entities, and critical infrastructure. Integrating AI and machine learning in ransomware operations is also a concerning trend, potentially leading to more adaptive and evasive malware.
Throughout its evolution, ransomware has consistently adapted to technological advancements and shifts in cybersecurity practices. This constant evolution underscores the need for robust, multi-layered cybersecurity strategies and regular updates to defense mechanisms.
A few of the countless strains of ransomware have emerged as particularly notorious. They wreak havoc across industries with their advanced techniques and high-profile attacks. These notable ransomware families are known for their unique characteristics, methods of attack, and the significant impact they have had on the global cybersecurity ecosystem.
Cryptolocker, emerging around 2013, set a precedent in the world of ransomware due to its advanced encryption methods. This malware encrypts a victim's files using asymmetric encryption, which requires two keys (public and private) to decrypt.
Victims would receive a ransom note demanding payment, usually in Bitcoin, for the private key. Cryptolocker was primarily spread through email attachments and was notorious for its high financial demands. It was effectively disabled by the Operation Tovar initiative in 2014, but its legacy endures as it inspired numerous subsequent ransomware strains.
Maze ransomware, which first appeared in 2019, introduced a new threat level by combining data encryption with data exfiltration. This double-extortion tactic meant that even if victims had backups to restore their data, the attackers could still publicly threaten to release sensitive stolen data unless an additional ransom was paid.
Maze targeted various sectors, from healthcare to finance, and was known for its sophisticated evasion techniques. Its impact was significant, causing data loss, reputational damage, and regulatory concerns for affected organizations.
Ryuk ransomware emerged in 2018 and is known for targeting large, high-value organizations with a tailored approach. Unlike other ransomware that spreads indiscriminately, Ryuk attacks are typically well-planned and executed against organizations likely to pay large ransoms.
Ryuk disrupts networks by encrypting critical files and systems, causing significant operational and financial damage to organizations, including major newspapers, healthcare providers, and technology companies.
Ransomware groups range from opportunistic amateurs using easily accessible tools to highly sophisticated, organized criminal enterprises. Some exhibit advanced techniques, encryption methods, and evasion tactics, while others rely on more basic strategies. Their motivations primarily revolve around financial gain.
Some seek quick profits through indiscriminate attacks on numerous small targets, while others meticulously target high-profile organizations for larger ransoms. Ideological or geopolitical motives might drive certain groups, where disrupting operations or causing chaos becomes their primary goal.
Some ransomware groups operate like businesses, with clear hierarchies, specialized roles (such as developers, affiliates, and negotiators), and efficient operational structures. Others might function as looser collectives or networks, sharing tools and intelligence.
Extortion gangs are opportunistic, but there are some patterns in the organizations they attack. Based on an analysis of dark web leak sites by Palo Alto Networks’ Unit 42 research group, manufacturing was one of the most targeted industries in recent years.
This trend is due to the prevalence of systems used by this industry running on out-of-date software that isn’t regularly or easily updated or patched—not to mention the industry’s low tolerance for downtime. According to leak site data, organizations based in the United States were most severely affected.
Advanced threat groups may use extortion and ransomware to fund other activities—or hide them. Threat groups from countries under economic embargoes or sanctions have been observed using ransomware and extortion to fund their operations. Other threat groups, including some from Iran or China, seem to have a different objective when using ransomware.
Threat actors can gain more than money from deploying ransomware—it also has the potential for destruction and espionage.
In the years ahead, Unit 42 experts expect to see continuing evolution in different types of ransomware and emerging trends like these from extortion groups: