Close Menu
    Facebook LinkedIn YouTube Instagram X (Twitter)
    Blue Tech Wave Media
    Facebook LinkedIn YouTube Instagram X (Twitter)
    • Home
    • Leadership Alliance
    • Exclusives
    • Internet Governance
      • Regulation
      • Governance Bodies
      • Emerging Tech
    • IT Infrastructure
      • Networking
      • Cloud
      • Data Centres
    • Company Stories
      • Profiles
      • Startups
      • Tech Titans
      • Partner Content
    • Others
      • Fintech
        • Blockchain
        • Payments
        • Regulation
      • Tech Trends
        • AI
        • AR/VR
        • IoT
      • Video / Podcast
    Blue Tech Wave Media
    Home » 5 biggest ransomware attacks in history
    ransomware attacks
    ransomware attacks
    Cloud

    5 biggest ransomware attacks in history

    By Lydia LuoMay 8, 2024No Comments5 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email
    • The highlighted ransomware attacks resulted in substantial financial losses, reaching billions of dollars collectively.
    • Attackers employed sophisticated tactics, such as exploiting software vulnerabilities and utilising social engineering techniques like phishing emails, to infiltrate systems and maximise their impact.
    • Ransomware attacks targeted organisations across various industries globally, demonstrating the widespread nature of the threat.

    Ransomware attacks represent a significant threat in today’s digital landscape, leaving devastating impacts on organisations worldwide. In this blog post, we will show the five most significant ransomware attacks in history, each showcasing the extent of financial losses, sophisticated strategies of the attackers, and the pressing need for robust cybersecurity measures.

    1. ExPetr

    Type of attack: Ransomware (a wiper exploiting an SMB vulnerability)

    Year: 2017

    Attackers: Likely Russian state-sponsored actors

    Target company: Various, but severely impacted Maersk and Merck

    Monetary impact: Estimated $10 billion

    In June 2017, the ExPetr, also referred to as NotPetya, ransomware assault swept across the world, resulting in substantial disruptions and damages. Diverging from typical ransomware tactics, ExPetr wasn’t crafted to demand ransom money; rather, its aim was to inflict maximum harm. Initially targeting Ukraine, it proved too virulent to be confined.

    NotPetya was soon identified as a wiper — a form of malware engineered to erase data — masquerading as ransomware. It exploited a vulnerability in Windows systems known as EternalBlue.

    The wiper rapidly propagated, encrypting the master boot record (MBR) to render affected systems unbootable. Upon infiltrating a network, it employed various techniques, including the Mimikatz tool, to gather credentials and propagate laterally.

    The collective financial toll attributed to NotPetya was estimated at approximately $10 billion, rendering it the most costly documented attack in history.

    Also read: World’s largest bank hit by LockBit ransomware gang linked to Boeing, Ion attacks

    2. WannaCry

    Type of attack: Ransomware (vulnerability in SMB protocol)

    Year: 2017

    Attackers: Believed to be the Lazarus Group

    Target company: Multiple (global attack); Microsoft Windows users

    Monetary impact: Estimated $4 billion

    In May 2017, the WannaCry ransomware attack hit 150 countries, affecting over 200,000 computers. Initial cost estimates reached $4 billion, with potential future losses in the U.S. alone projected to exceed $7 trillion.

    WannaCry exploited a critical vulnerability in Microsoft’s implementation of the Server Message Block (SMB) protocol known as EternalBlue, allegedly developed by the US National Security Agency (NSA) and leaked by the Shadow Brokers group.

    The ransomware encrypted files on victims’ computers, demanding payment in Bitcoin for a decryption key, typically $300, doubling if not paid within three days. Acting as a worm, WannaCry spread automatically through networks, causing widespread disruption to critical infrastructures like healthcare, finance, and transportation.

    Also read: EvilProxy Phishing Campaign Targets Microsoft 365 Users, Focuses on C-Level Executives

    3. GandCrab

    Type of attack: Ransomware-as-a-service (RaaS) (phishing, exploit kits)

    Year: 2018-2019

    Attackers: Unknown, operators announced ‘retirement’ in 2019

    Target company: Various, including businesses and individuals (PCs using MS Windows)

    Monetary Impact: Estimated over $2 billion

    In 2018, GandCrab emerged as a highly pervasive and profitable ransomware attack. What distinguished GandCrab was its Ransomware-as-a-Service (RaaS) approach, wherein affiliates were licensed to carry out attacks and share profits with the developers.

    GandCrab spread primarily through phishing emails and exploit kits, notably the GrandSoft and RIG kits. Upon infecting a victim’s system, GandCrab encrypted files and demanded a ransom in Dash cryptocurrency for decryption.

    4. Locky

    Type of attack: Ransomware (phishing emails distributing a macro in a Word document)

    Year: 2016 – 2018

    Attackers: Unknown, possibly the Dridex hackers (aka Evil Corp or TA505)

    Target company: Various (predominantly healthcare providers in the US, Canada, France, Japan, Korea, and Thailand)

    Monetary Impact: Estimated $1 billion

    Locky, active mainly from 2016 to 2018, stood out as one of the most widespread ransomware variants, propagated through extensive phishing campaigns. It infiltrated systems via email attachments containing malicious Word documents. Upon opening the document and enabling macros, the ransomware payload was downloaded and activated.

    Locky encrypted various types of data files, scrambled their filenames, and demanded payment in Bitcoin for decryption. Notably, it could encrypt files stored on network shares, increasing its potential for harm. Using a mix of RSA and AES encryption, Locky rendered victim files inaccessible until a ransom was paid, typically ranging from 0.5 to 1 Bitcoin.

    Also read: HKBN offers free phishing assessments to SPO

    5. Ryuk

    Type of attack: Ransomware (usually TrickBot infection)

    Year: 2018 – 2020

    Attackers: Unclear, possibly various groups using the Ryuk malware or Wizard Spider (Russia)

    Target company: Various, mostly healthcare and municipalities

    Monetary Impact: Estimated $150 million

    Debuting in mid-2018, Ryuk ransomware swiftly emerged as a significant menace to large-scale enterprises. Diverging from typical ransomware tactics reliant on automated distribution, Ryuk is manually deployed following an initial network breach. Attackers meticulously map networks, extract data, and gather credentials before unleashing Ryuk ransomware, aiming for maximal disruption.

    Ryuk employs a blend of RSA-2048 and AES-256 encryption, rendering it highly resistant to decryption without the requisite keys. Moreover, the malware is engineered to encrypt network drives, resources, and remote hosts. Ryuk has been linked to numerous high-profile attacks, with ransom demands spanning from 15 to 500 Bitcoin (approximately $100,000 to $3.7 million).

    ExPetr GandCrab Locky ransomware attack Ryuk WannaCry
    Lydia Luo

    Lydia Luo, an intern reporter at BTW media dedicated in IT infrastructure. She graduated from Shanghai University of International Business and Economics. Send tips to j.y.luo@btw.media.

    Related Posts

    Australia’s regulator gives final nod to Vocus–TPG fibre deal

    July 8, 2025

    Trump Media launches Truth+ streaming with Newsmax

    July 8, 2025

    Vocus secures government greenlight for $3.4B TPG telecom deal

    July 8, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    CATEGORIES
    Archives
    • July 2025
    • June 2025
    • May 2025
    • April 2025
    • March 2025
    • February 2025
    • January 2025
    • December 2024
    • November 2024
    • October 2024
    • September 2024
    • August 2024
    • July 2024
    • June 2024
    • May 2024
    • April 2024
    • March 2024
    • February 2024
    • January 2024
    • December 2023
    • November 2023
    • October 2023
    • September 2023
    • August 2023
    • July 2023

    Blue Tech Wave (BTW.Media) is a future-facing tech media brand delivering sharp insights, trendspotting, and bold storytelling across digital, social, and video. We translate complexity into clarity—so you’re always ahead of the curve.

    BTW
    • About BTW
    • Contact Us
    • Join Our Team
    TERMS
    • Privacy Policy
    • Cookie Policy
    • Terms of Use
    Facebook X (Twitter) Instagram YouTube LinkedIn

    Type above and press Enter to search. Press Esc to cancel.