Trends
5 major types of ransomware attacks
Ransomware is one of the most effective strategies for attacking businesses, critical infrastructure and individuals. This type of malware infects computers and prohibits or severely restricts users and external software from accessing devices or entire systems until ransom demands are met. For a lo…

Headline
Ransomware is one of the most effective strategies for attacking businesses, critical infrastructure and individuals. This type of malware infects computers and prohibits or severely restricts users and external software from accessing devices or entire systems until ransom…
Context
Ransomware is one of the most effective strategies for attacking businesses, critical infrastructure and individuals. This type of malware infects computers and prohibits or severely restricts users and external software from accessing devices or entire systems until ransom demands are met. For a long time, there were only two major types of ransomware: crypto and locker ransomware. Today, unfortunately, more types of ransomware have emerged, targeting users and organisations with different approaches.
Evidence
Pending intelligence enrichment.
Analysis
This kind of ransomware makes unavailable your important files and data, including documents and multimedia, by encrypting them and taking away the decryption key. Still, the other functionalities of the victims’ computers remain intact. Attackers then demand a ransom in exchange for the decryption key. They often provide a countdown and a warning that files will be deleted if the ransom is not paid. Victims tend to pay the ransom depending on how sensitive and important the encrypted data is. However, you cannot guarantee that the attackers will return the decryption key. A well-known example of crypto ransomware is WannaCry , which affected hundreds of thousands of computers in over 150 countries in 2017. Locker ransomware, also called “screen lockers,” locks your computer once it’s attacked, making all or some of the system data and functionalities inaccessible. For instance, you may not be able to access the computer desktop, but you might still be able to operate the mouse and keyboard with limited functionality. Here, the attackers only allow you to interact with the screen that shows the ransom note. Since the important data remains unencrypted, it will not be destroyed. This type of ransomware also often includes a countdown clock to force the user to pay the ransom as soon as possible.
Key Points
- When it comes to cybersecurity, ransomware is probably one of the first threats that comes to our minds. Today, ransomware is among the major cybersecurity threats affecting individuals, businesses and organisations every day.
- This article contains 5 major types of ransomware attacks, including crypto ransomware, locker ransomware, scareware, leakware and double extortion ransomware.
- Regardless of the type of ransomware, backing up data in advance and proper employment of security software can significantly reduce the intensity of an attack.
Actions
Pending intelligence enrichment.





