Tech’s Log Ransomware.
By Texas Technology
In 2023, the landscape of ransomware and malware continued to evolve, with various types of threats impacting users globally. Here are some notable types and examples:
Types of Ransomware:
- Crypto Ransomware or Encryptors: These encrypt files and data within a system, making them inaccessible without a decryption key.
- Lockers: These lock users out of their systems entirely, displaying a ransom demand on a lock screen.
- Scareware: This type involves fake software claiming to have detected issues on the computer and demanding payment to resolve them.
- Doxware or Leakware: Threatens to publish sensitive information online unless a ransom is paid.
- RaaS (Ransomware as a Service): A model where ransomware is hosted anonymously by hackers who manage all aspects of the attack for a share of the profits.
Notable Malware and Ransomware Variants:
- CoinMiner: A cryptocurrency miner that uses Windows Management Instrumentation (WMI) for spreading and executing scripts for persistence.
- NanoCore: A Remote Access Trojan (RAT) spread via malicious email attachments, capable of downloading and executing files, visiting websites, and modifying registry keys.
- ZeuS: A banking Trojan that uses keystroke logging to steal credentials.
- ViperSoftX: A cryptocurrency stealer spread through torrents and filesharing sites.
- Agent Tesla: A RAT targeting Windows operating systems, available for purchase on criminal forums, with capabilities including capturing keystrokes and screenshots, and exfiltrating files.
Ransomware Statistics:
The monetary cost, psychological trauma, and loss of valuable data like family photos and work-related documents are significant impacts of ransomware attacks. Some notable attacks and their impacts include:
- WannaCry: In 2017, it affected 200,000 computers across 150 countries, with damages amounting to hundreds of millions.
- NotPetya: Caused about $10 billion in damages worldwide in 2017, affecting major companies like Maersk and FedEx.
- CryptoLocker: Had a global cost of around $3 million between September 2013 and May 2014.
- Ryuk: Generated more than $3.7 million in the first four months after its start in August 2018.
- Teslacrypt: Targeted video game-related files, with hackers extorting $76,000 within two months of its launch.
These details underscore the importance of robust cybersecurity measures and awareness of the evolving threats in the digital landscape.