Ransomware has become an increasingly effective way for attackers to target businesses, critical infrastructure, and individuals. This malicious software infects computers and restricts users and external software from accessing devices or entire systems until a ransom is paid. Understanding the different types of ransomware and their impact is crucial in order to protect against these attacks.
Ransomware can be categorized based on how it is delivered and what it impacts. In terms of delivery, there are three main types: ransomware as a service (RaaS), automated delivery, and human-operated delivery. RaaS involves renting access to a ransomware strain from the creator, who offers it as a pay-for-use service. Automated delivery refers to the distribution of ransomware through automated means, while human-operated delivery involves attackers personally infiltrating systems to deploy the malware.
When it comes to the impact of ransomware, it can affect the availability of data, destroy the data, disrupt access to services, or exfiltrate data. Locker ransomware, for example, blocks access to computer systems entirely, often using social engineering techniques. Crypto ransomware, on the other hand, encrypts files on a computer and demands a ransom for the decryption key. Scareware is a tactic used to scare victims into believing their devices are infected with malware, while extortionware involves stealing data and threatening to publish it unless a ransom is paid. Wiper malware is not necessarily ransomware, but it targets and wipes data from victims’ systems, aiming to destroy evidence or disrupt operations.
Double extortion ransomware encrypts files and exports data to blackmail victims into paying a ransom. This means that even if victims can restore their data, the attackers still have power over them. Triple extortion ransomware adds another layer by disrupting business operations or intimidating employees, clients, suppliers, or partners.
In terms of specific examples of ransomware strains, the first documented case of ransomware dates back to December 1989 with the AIDS Trojan, created by Joseph Popp. Popp sent 20,000 floppy disks containing the AIDS Trojan to researchers, encrypting victims’ files and demanding a ransom. Another notable example is CryptoLocker, which emerged in September 2013 and combined locker and crypto ransomware. It used a 2,048-bit RSA encryption key and spread through spam emails and infected websites.
Understanding the history and different strains of ransomware is crucial in order to develop effective security measures and protect against these attacks. As technology continues to advance, so too does the sophistication of ransomware, making it imperative for individuals, businesses, and organizations to stay vigilant and employ robust security measures to prevent falling victim to these malicious attacks.

