What's new

Help Top Fatal Ransomware(Full Descriptions)

Xerodeu

Eternal Poster
Joined
Jul 18, 2020
Posts
623
Solutions
1
Reaction
1,355
Points
370
Heres The Top Ransomwares And the Most Feared Ransomware Spreaded Across the Globe.

First Of All What IS RANSOMWARE:Ransomware Is A File Encrypting Software After You Got Encrypted Attackers Ask For Ransom In order To Unlock Your Files.


1.LOCKY-Locky is ransomware that was first used for an attack in 2016 by a group of organized häçkers. Locky encrypted more than 160 file types and was spread by means of fake emails with infected attachments. Users fell for the email trick and installed the ransomware on their computers. This method of spreading is called phishing, and is a form of what is known as social engineering. Locky ransomware targets file types that are often used by designers, developers, engineers and testers

Release:March,2016
Type:Trojan
Av vendor Detections:
  • Ransom:Win32/Locky.A (You do not have permission to view the full content of this post. Log in or register now.)
  • Trojan.Encoder.3976 (You do not have permission to view the full content of this post. Log in or register now.)
  • Win32/Filecoder.Locky.A (You do not have permission to view the full content of this post. Log in or register now.)
  • Malicious_Behavior.VEX.99 (You do not have permission to view the full content of this post. Log in or register now.)
  • Trojan-Ransom.Win32.Locky.d (You do not have permission to view the full content of this post. Log in or register now.)
  • Trojan.Cryptolocker.AF (You do not have permission to view the full content of this post. Log in or register now.)
2.Ryuk(Based On Death Note Demon)-Ryuk is an encryption Trojan that spread in August 2018 and disabled the recovery function of Windows operating systems. This made it impossible to restore the encrypted data without an external backup. Ryuk also encrypted network hard disks. The impact was huge, and many of the US organizations that were targeted ρáíd the ransom sums demanded. The total damage is estimated at over $640,000

Release:August.2018
Type:Trojan

Suspected organization:North Korean,Russian
Av Vendors detection:

  • Ransom.ryuk (Malwarebytes)
  • Win64:RansomX-gen [Ransom] (Avast)
  • Generic.Ransom.Ryuk.CF0B8F43 (B) (Emsisoft)
  • HEUR:Trojan.Win32.Generic (Kaspersky)
  • Ransom:Win32/Ryuk.S!MTB (WinDefender/Microsoft)
3.Wannacry-You do not have permission to view the full content of this post. Log in or register now. was a ransomware attack that spread to over 150 countries in 2017. It was designed to exploit a security vulnerability in Windows that was created by the NSA and leaked by the Shadow Brokers häçker group. WannaCry affected 230,000 computers worldwide. The attack hit one-third of all NHS hospitals in the UK, causing estimated damages of 92 million pounds. Users were locked out and a ransom payable in Bitcoin was demanded. The attack exposed the issue of outdated systems, because the häçker exploited an operating system vulnerability for which a ρá†ch had long existed at the time of the attack. The worldwide financial damage caused by WannaCry was approximately US$4...Wannacry can Travel through Network,And Used HID(Human Interface devices) recently used by Infected Pc.

Release:May 12,2017
Type:CryptoWorm(Worm Is A StandAlone Malware That Can Spread Through Network And Replicate It Self Over And Over Again)
Suspected Organizations:
Lazarus Group
Origin:Pyongyang,North Korea
Damage:92 million Dollars
Extension: .wannacry, .wcry, .wncryt, .wncry
Av vendor detection:

  • Sf:WNCryLdr-A [Trj] (Avast)
  • Trojan.Ransom.WannaCryptor.H (B) (Emsisoft)
  • Trojan-Ransom.Win32.Wanna.m (Kaspersky)
  • WannaCry.Ransom.Encrypt.DDS (Malwarebytes)
  • Ransom:Win32/WannaCrypt.H (WinDefener/Microsoft)
  • Malware.Win32.Gen.bot!se30058 (Grindinsoft)

4.
Petya-Petya is a ransomware attack that occurred in 2016 and was resurrected as GoldenEye in 2017. Instead of encrypting certain files, this malicious ransomware encrypted the victim's entire hard disk. This was done by encrypting the Master Boot Record(MBR), which made it impossible to access files on the hard disk. Petya ransomware spread to corporate HR departments via a fake application that contained an infected Dropbox link

Release:March 2016
Suspected organizations:Unknown
Type:
Full Malware
Av vendor detection:
  • Malwarebytes:Ransom.Petya
  • Fortinet:W32/Petya.D!tr.ransom
  • Kaspersky:Trojan-Ransom.Win32.Petr.eu
  • Emisoft:Trojan-Ransom.GoldenEye (A)
  • Microsoft:Ransom:Win32/Petya
  • NANO-Antivirus:Trojan.Win32.Ransom.ejgwkv
5.GandGrab-GandCrab is unsavory ransomware that threatened to disclose the **** habits of its victims. It claimed that it had häçked the victim's webcam and demanded a ransom. If the ransom wasn't ρáíd, embarrassing footage of the victim would be published online. After its first appearance in 2018, GandCrab ransomware continued to develop in various versions. As part of the "No More Ransom" initiative, security providers and police agencies developed a ransomware decryption tool to help victims recover their sensitive data from GandCrab.

Release:January,2018
Suspected organozation:Unknown
Type:
Trojan
Extension: .KCRAB, .CRAB, .GDCB, .(+)
Av Vendor Detection:

  • Trojan.Win32.Encoder.eytbdj (NANO-Antivirus)
  • Ransom:Win32/Gandcrab (Microsoft)
  • Generic.Ransom.GandCrab.D0BCA546 (B) (Emsisoft)
  • Ransom.Win32.Gandcrab.oa (GrindinSoft)
  • Win32:RansomX-gen [Ransom] (Avast)
  • Ransom.GandCrab (Malwarebytes)
  • HEUR:Trojan.Win32.Generic (Kaspersky)
Thats All For Now If Im Mistaken you Can Reply to the thread And Correct Me...I've Done Double Research To Avoid Fake Informations...Thats All Becareful Executing Anything on your machine...That Could Lead To Fatal Consequences.
 

Similar threads

Back
Top