


Ryuk : Ryuk is a very targeted ransomware variant that demands high ransoms from its victims.Industry experts have said Conti is based in Russia and may have ties to Russian intelligence. Conti – Conti is a ransomware-as-a-service (RaaS) group, which allows affiliates to rent access to its infrastructure to launch attacks.The original variant of WannaCry used EternalBlue, an NSA-developed exploit leaked by the ShadowBrokers, to spread via vulnerable versions of Windows’ SMB. WannaCry : WannaCry is the ransomware variant that started the recent surge in ransomware attacks. In July 2021, LockBit infected Accenture, stealing internal data and encrypting servers that were later restored from backups. LockBit: LockBit ransomware is a RaaS variant that first emerged in September 2019, when it was called the ABCD ransomware (due to its.REvil suddenly ceased operations in July 2021 after a famous attack on Kaseya. REvil: REvil, also known as Sodinokibi, was famous for being one of the ransomware variants with the highest demands.Some of the most prolific and famous ransomware variants include: The success of ransomware has prompted many different cybercrime groups to develop their own variants. RaaS provides affiliates with access to advanced malware and enables the ransomware authors to scale their campaigns, increasing the ransomware threat. Instead of a single group developing malware, infecting organizations, and collecting ransoms, ransomware authors now distribute their malware to “affiliates” for use in their attacks. Some ransomware groups also use the threat of Distributed Denial of Service (DDoS) attacks as incentive to meet their demands.įinally, the ransomware threat has evolved due to role specialization and the creation of the Ransomware as a Service (RaaS) model for attacks. Modern ransomware operators threaten to leak stolen data if a ransom is not paid by the victim and, in some cases, their customers. The ability to restore from backups neutralizes the impact of data encryption, so ransomware has branched out to data theft as well. The techniques used by ransomware operators to force victims to pay the ransom have changed as well. Ransomware now mainly targets remote access solutions, exploiting VPN vulnerabilities or using compromised employee credentials to log in via RDP. One major change is in the infection vectors used. In the last few years, ransomware campaigns have evolved quickly.

#RANSOMWHERE MAX SOFTWARE#
If the ransom was paid, the attackers provided decryption software that enabled the victim to restore normal operations. The malware was delivered via email or exploitation of a software vulnerability and encrypted files on the infected machines. The original ransomware campaigns were relatively simple. Ransomware is an evolving threat to corporate security.
