{"id":15933,"date":"2020-10-28T11:53:00","date_gmt":"2020-10-28T15:53:00","guid":{"rendered":"https:\/\/www.techwalls.com\/?p=15933"},"modified":"2021-11-18T10:21:30","modified_gmt":"2021-11-18T15:21:30","slug":"ransomware-popular-variants-protecting-preventing","status":"publish","type":"post","link":"https:\/\/www.techwalls.com\/ransomware-popular-variants-protecting-preventing\/","title":{"rendered":"Ransomware \u2013 Popular Variants, Protecting and Preventing Plus What to do When Infected"},"content":{"rendered":"\n<p>Ransomware refers to a type of malicious software that shields victims from accessing their databases, pictures, documents, and other files. It encrypts these accessories and demands a ransom to decrypt them back. The payment has a deadline after which, if not met, the demand increases, or the ransomware encrypts the accessories forever.<\/p>\n\n\n\n<!--more-->\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"306\" src=\"https:\/\/www.techwalls.com\/wp-content\/uploads\/2014\/05\/ransomware.jpg\" alt=\"\" class=\"wp-image-6515\" srcset=\"https:\/\/www.techwalls.com\/wp-content\/uploads\/2014\/05\/ransomware.jpg 500w, https:\/\/www.techwalls.com\/wp-content\/uploads\/2014\/05\/ransomware-300x184.jpg 300w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/figure><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Most common ransom variants you should be aware of<\/h2>\n\n\n\n<p><strong><em>Jaff<\/em><\/strong><\/p>\n\n\n\n<p>This ransomware began its distribution in May 2017 by Necrus bonnet. The distribution was through spam emails that contained a PDF attachment with an embedded DOCM file. The malware\u2019s infection rate was around 10,000 emails per hour.<\/p>\n\n\n\n<p><strong><em>Cryptowall<\/em><\/strong><\/p>\n\n\n\n<p>It is one of the most prominent malware to date after taking over <a href=\"https:\/\/en.wikipedia.org\/wiki\/CryptoLocker\">Crptolocker<\/a> sometimes back. This malware uses AES encryption and conducts its Command and Control communications over the Tor network.<\/p>\n\n\n\n<p><strong><em>Cerber<\/em><\/strong><\/p>\n\n\n\n<p>This is an offline ransomware that spreads mainly via malvertising campaigns that leverage exploit kits. It also spreads through spam campaigns.<\/p>\n\n\n\n<p><strong><em>TorrentLocker<\/em><\/strong><\/p>\n\n\n\n<p>This threat encrypts user pictures, documents, and other types of files. It requests victims to pay up to $1800 so that their files can be decrypted.<\/p>\n\n\n\n<p><strong><em>WannaCry<\/em><\/strong><\/p>\n\n\n\n<p>May 2017 saw this ransomware spread on a large scale. It makes use of EternalBlue to propagate between and within networks. EternalBlue is a <a href=\"https:\/\/en.m.wikipedia.org\/wiki\/Server_Message_Block\">Windows SMB<\/a> exploit.<\/p>\n\n\n\n<p><strong><em>Locky<\/em><\/strong><\/p>\n\n\n\n<p>This ransomware spreads mainly through spam emails. The emails have a downloader disguised as a Word or Zip attachment. This downloader downloads and installs the malware that encrypts users\u2019 files.<\/p>\n\n\n\n<p><strong>How can an organization reduce its exposure to ransomware and prevent its impacts?<\/strong><\/p>\n\n\n\n<p><strong><em>Continuous data backups<\/em><\/strong><\/p>\n\n\n\n<p>Automated and protected data backups help an organization recover from any malware attack with a minimum data loss. You don\u2019t need to pay a ransom either.<\/p>\n\n\n\n<p><strong><em>User Authentication<\/em><\/strong><\/p>\n\n\n\n<p>The use of strong user authentication makes it difficult for an attacker to utilize guessed or stolen passwords.<\/p>\n\n\n\n<p><strong><em>Patching<\/em><\/strong><\/p>\n\n\n\n<p>Organizations should ensure that all systems are equipped with the latest patches applied to them. When this is done, potential vulnerabilities within the business for an attacker to exploit are reduced.<\/p>\n\n\n\n<p><strong><em>Anti-Ransomware Solutions<\/em><\/strong><\/p>\n\n\n\n<p>Ransomware contains a unique fingerprint when running on the system. This is why it encrypts all of the user\u2019s files. Specialized anti-ransomware solutions use the unique fingerprint to identify and terminate any potential malicious processes.<\/p>\n\n\n\n<p><strong>What should you do when infected with ransomware?<\/strong><\/p>\n\n\n\n<p>Think of those goosebumps a ransom message may bring to your arms when it arrives on your computer. It signals successful ransomware infection. This is the last thing that you may want to happen to you.<\/p>\n\n\n\n<p><strong><em>Quarantine your device<\/em><\/strong><\/p>\n\n\n\n<p>You should limit the spread of the malware by denying or removing access to other potential targets.<\/p>\n\n\n\n<p><strong><em>Check for decryptors<\/em><\/strong><\/p>\n\n\n\n<p>This is done using the No More Ransom Project.<\/p>\n\n\n\n<p><strong><em>Wipe and Restore<\/em><\/strong><\/p>\n\n\n\n<p>Restore the machine from a clean backup or operating system installation.<\/p>\n\n\n\n<p><strong><em>Ask for Help<\/em><\/strong><\/p>\n\n\n\n<p>A digital forensics expert may recover files not deleted by the malware.<\/p>\n\n\n\n<p><strong><em>Leave the computer on<\/em><\/strong><\/p>\n\n\n\n<p>Keeping the computer increases the chances of recovery.<\/p>\n\n\n\n<p><strong><em>Create a backup<\/em><\/strong><\/p>\n\n\n\n<p>You should make a copy of encrypted files on removable media since decryption of files for some ransomware variants can be possible without paying the ransom.<\/p>\n\n\n\n<p><strong>Conclusion<\/strong><\/p>\n\n\n\n<p>Anti Ransomware technology defends against the most critical variants of ransomware and safely recovers any encrypted data.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware refers to a type of malicious software that shields victims from accessing their databases, pictures, documents, and other files. It encrypts these accessories and demands a ransom to decrypt them back. The payment has a deadline after which, if not met, the demand increases, or the ransomware encrypts the accessories forever.<\/p>\n","protected":false},"author":89,"featured_media":6515,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[9],"tags":[52],"class_list":{"0":"post-15933","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-news-2","9":"entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ransomware \u2013 Popular Variants, Protecting and Preventing Plus What to do When Infected - TechWalls<\/title>\n<meta name=\"description\" content=\"Ransomware refers to a type of malicious software that shields victims from accessing their databases, pictures, documents, and other files. It encrypts these accessories and demands a ransom to decrypt them back.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.techwalls.com\/ransomware-popular-variants-protecting-preventing\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Guest Authors\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.techwalls.com\/ransomware-popular-variants-protecting-preventing\/\",\"url\":\"https:\/\/www.techwalls.com\/ransomware-popular-variants-protecting-preventing\/\",\"name\":\"Ransomware \u2013 Popular Variants, Protecting and Preventing Plus What to do When Infected - TechWalls\",\"isPartOf\":{\"@id\":\"https:\/\/www.techwalls.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.techwalls.com\/ransomware-popular-variants-protecting-preventing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.techwalls.com\/ransomware-popular-variants-protecting-preventing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.techwalls.com\/wp-content\/uploads\/2014\/05\/ransomware.jpg\",\"datePublished\":\"2020-10-28T15:53:00+00:00\",\"dateModified\":\"2021-11-18T15:21:30+00:00\",\"author\":{\"@id\":\"https:\/\/www.techwalls.com\/#\/schema\/person\/440f216965cffca997e53e754f489c84\"},\"description\":\"Ransomware refers to a type of malicious software that shields victims from accessing their databases, pictures, documents, and other files. It encrypts these accessories and demands a ransom to decrypt them back.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.techwalls.com\/ransomware-popular-variants-protecting-preventing\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.techwalls.com\/ransomware-popular-variants-protecting-preventing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techwalls.com\/ransomware-popular-variants-protecting-preventing\/#primaryimage\",\"url\":\"https:\/\/www.techwalls.com\/wp-content\/uploads\/2014\/05\/ransomware.jpg\",\"contentUrl\":\"https:\/\/www.techwalls.com\/wp-content\/uploads\/2014\/05\/ransomware.jpg\",\"width\":500,\"height\":306},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.techwalls.com\/ransomware-popular-variants-protecting-preventing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.techwalls.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"News\",\"item\":\"https:\/\/www.techwalls.com\/news\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Ransomware \u2013 Popular Variants, Protecting and Preventing Plus What to do When Infected\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.techwalls.com\/#website\",\"url\":\"https:\/\/www.techwalls.com\/\",\"name\":\"TechWalls\",\"description\":\"Technology News | Gadget Reviews | Tutorials\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.techwalls.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.techwalls.com\/#\/schema\/person\/440f216965cffca997e53e754f489c84\",\"name\":\"Guest Authors\",\"url\":\"https:\/\/www.techwalls.com\/author\/guestauthor\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware \u2013 Popular Variants, Protecting and Preventing Plus What to do When Infected - TechWalls","description":"Ransomware refers to a type of malicious software that shields victims from accessing their databases, pictures, documents, and other files. It encrypts these accessories and demands a ransom to decrypt them back.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.techwalls.com\/ransomware-popular-variants-protecting-preventing\/","twitter_misc":{"Written by":"Guest Authors","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.techwalls.com\/ransomware-popular-variants-protecting-preventing\/","url":"https:\/\/www.techwalls.com\/ransomware-popular-variants-protecting-preventing\/","name":"Ransomware \u2013 Popular Variants, Protecting and Preventing Plus What to do When Infected - TechWalls","isPartOf":{"@id":"https:\/\/www.techwalls.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.techwalls.com\/ransomware-popular-variants-protecting-preventing\/#primaryimage"},"image":{"@id":"https:\/\/www.techwalls.com\/ransomware-popular-variants-protecting-preventing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.techwalls.com\/wp-content\/uploads\/2014\/05\/ransomware.jpg","datePublished":"2020-10-28T15:53:00+00:00","dateModified":"2021-11-18T15:21:30+00:00","author":{"@id":"https:\/\/www.techwalls.com\/#\/schema\/person\/440f216965cffca997e53e754f489c84"},"description":"Ransomware refers to a type of malicious software that shields victims from accessing their databases, pictures, documents, and other files. It encrypts these accessories and demands a ransom to decrypt them back.","breadcrumb":{"@id":"https:\/\/www.techwalls.com\/ransomware-popular-variants-protecting-preventing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.techwalls.com\/ransomware-popular-variants-protecting-preventing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techwalls.com\/ransomware-popular-variants-protecting-preventing\/#primaryimage","url":"https:\/\/www.techwalls.com\/wp-content\/uploads\/2014\/05\/ransomware.jpg","contentUrl":"https:\/\/www.techwalls.com\/wp-content\/uploads\/2014\/05\/ransomware.jpg","width":500,"height":306},{"@type":"BreadcrumbList","@id":"https:\/\/www.techwalls.com\/ransomware-popular-variants-protecting-preventing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.techwalls.com\/"},{"@type":"ListItem","position":2,"name":"News","item":"https:\/\/www.techwalls.com\/news\/"},{"@type":"ListItem","position":3,"name":"Ransomware \u2013 Popular Variants, Protecting and Preventing Plus What to do When Infected"}]},{"@type":"WebSite","@id":"https:\/\/www.techwalls.com\/#website","url":"https:\/\/www.techwalls.com\/","name":"TechWalls","description":"Technology News | Gadget Reviews | Tutorials","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.techwalls.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.techwalls.com\/#\/schema\/person\/440f216965cffca997e53e754f489c84","name":"Guest Authors","url":"https:\/\/www.techwalls.com\/author\/guestauthor\/"}]}},"_links":{"self":[{"href":"https:\/\/www.techwalls.com\/wp-json\/wp\/v2\/posts\/15933","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.techwalls.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.techwalls.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.techwalls.com\/wp-json\/wp\/v2\/users\/89"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techwalls.com\/wp-json\/wp\/v2\/comments?post=15933"}],"version-history":[{"count":0,"href":"https:\/\/www.techwalls.com\/wp-json\/wp\/v2\/posts\/15933\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.techwalls.com\/wp-json\/wp\/v2\/media\/6515"}],"wp:attachment":[{"href":"https:\/\/www.techwalls.com\/wp-json\/wp\/v2\/media?parent=15933"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.techwalls.com\/wp-json\/wp\/v2\/categories?post=15933"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.techwalls.com\/wp-json\/wp\/v2\/tags?post=15933"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}