Skip to content

Ransomware Roulette: 5 Types of Ransomware & Their Tactics

Ransomware is a devastating cyber attack threat actors use to steal, corrupt, hold for ransom payment, and even destroy sensitive data from enterprises. 

In 2023, 4,611 ransomware cases were reported, marking a 70% increase from 2022's recorded cases, according to the SANS Institute.

With all the different types of ransomware threat actors deploy, is your organization secure from the evolving cyber threat landscape?

In this article, we discuss five ransomware variants that target businesses and the methods threat actors commonly use to distribute ransomware attacks.

 

5 Types of Ransomware Targeting Industries Today

1. Lockerware

Locker ransomware (or "lockerware") infects systems by preventing users from accessing their devices altogether. After the locker ransomware locks users out of their systems, the user will only be able to view a lock screen that contains details of the ransom note demanding payment. 

2. Extortionware

Extortionware or double extortion ransomware is a type of ransomware that infiltrates and steals sensitive or incriminating data from an organization, providing leverage to threat actors who then threaten to leak the information to the public unless their demands are met. 

The release of such data may also prompt law enforcement agencies tobecome involved, leading to legal consequences for the attackers.

3. Crypto-Ransomware

Crypto-ransomware, also known as encrypting ransomware, is a type of ransomware designed to encrypt data files on a victim's system, making them inaccessible until a ransom is paid.

Once infected, crypto ransomware encrypts critical data, and victims are left unable to access their files until they comply with the attacker's demands. Maze ransomware is a well-known example that used this approach.

This type of ransomware has become increasingly prevalent and damaging due to its effectiveness and the difficulty of decrypting files without the cyber criminal's private key. 

4. Wiper Ransomware

Wiper malware is a type of ransomware programmed to irreversibly damage or erase data on infected systems, like petya ransomware. This malicious software is commonly used against businesses, as it can take organizational operations offline and cause irreparable financial damage due to downtime.

5. Doxware

With doxware (or leakware"), threat actors compromise and steal data sources, including emails, documents, SMS messages, and more. Because the threatened release can lead to reputational damage, financial loss, or legal consequences, it's harder to avoid paying the ransom, ultimately making the attack more profitable for ransomware attackers.

 

 

Common Tactics Threat Actors Use to Distribute Ransomware

Ransomware infects systems through both human error and technical vulnerabilities, making it essential to prevent ransomware attacks by proactive measures. Listed below are the common ransomware tactics threat actors use to distribute ransomware:

1. Phishing (including vishing and smishing).

By placing malicious software in text messages and phishing emails, ransomware developers and threat actors prompt targets to instinctively open infected files and inject malicious code. This can lead to the spread of ransomware across an organization and its systems.

2. Social engineering

Threat actors target employees who may be new, have higher permissions, or are ill-informed about social engineering tactics. They may pose as an authoritative figure or an executive, demanding certain credentials or authorization from their target. Threat actors may use fake antivirus software to deliver ransomware.

3. Ransomware as a Service

Ransomware as a Service (RaaS) providers give threat actors the necessary ransomware tools and resources needed for initiating attacks. This makes it much easier for threat actors, regardless of their experience, to launch devastating ransomware attacks on businesses worldwide.

4. Drive-by attacks

Threat actors launch drive-by ransomware attacks by targeting vulnerable internal assets, such as operating systems, web browsers, browser plugins/extensions, and applications. Threat actors often exploit vulnerabilities and only require the target to open any of the infected components to successfully launch a ransomware attack.

5. Remote Desk Protocol (RDP) Targeting

While remote work offers many benefits, there are several software vulnerabilities at play as well. Threat actors may scour online for vulnerable ports initiated by remote desktop protocol and use the same attack vector to continuously infiltrate the company through their target.

 

Get the Most Comprehensive Resource for Recovering from Ransomware

Learning about different types of ransomware, including how they are distributed, is just one part of a more important strategy for keeping your business protected.

Our team of cybersecurity experts has put together a comprehensive resource for helping you detect ransomware early and recover in the event of a ransomware attack. With this resource, you may improve your chances of eliminating downtime or more ransomware attacks in the future.

Ready to boost your ransomware protection? Contact us today and talk with our experts about building a stronger defense against ransomware threats!

Get your copy of our Ransomware Recovery Checklist now!

 

Frequently Asked Questions (FAQs)

1. What is the difference between lockerware and crypto-ransomware?

Lockerware incapacitates access to a whole device or system such that users can't use anything but a lock screen carrying the ransom demand. Crypto-ransomware, however, encrypts particular files on the device such that they cannot be used until a ransom is paid to secure the decryption key.

2. Why is extortionware considered more threatening than other ransomware types?

Extortionware not only infiltrates an organization's system but also steals sensitive or incriminating data. Threat actors then use this stolen data as leverage, threatening to release it publicly unless their ransom demands are met, which can lead to serious reputational and legal consequences.

3. How can phishing attacks lead to ransomware infections?

Phishing attacks work by tricking users into clicking on malicious links or downloading infected attachments. Once this happens, ransomware can be installed on the system and potentially spread throughout the organization's network.

4. What's the difference between a drive-by attack and phishing?

The key difference is that phishing requires user interaction, such as clicking a link or downloading a file. Drive-by attacks do not; simply visiting a compromised website or opening an infected browser plugin can be enough for ransomware to be installed without the user's knowledge.

5. Where can I find resources to help my business recover from a ransomware attack?

To support ransomware victims or businesses in recovering from ransomware incidents, Tec-Refresh offers a downloadable Ransomware Recovery Checklist. This resource is designed to guide organizations in minimizing downtime and implementing effective response strategies.