Homepage Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Cisco Partner Summit Digital 2020 HPE Zone The Business Continuity Center Enterprise Tech Provider Masergy Zenith Partner Program Newsroom Hitachi Vantara Digital Newsroom IBM Newsroom Juniper Newsroom Lenovo GoChannelFirst The IoT Integrator NetApp Data Fabric Intel Tech Provider Zone

8 Types Of Ransomware Attacks You Need To Know About

Here's a look at how everything from database encryption to geofencing and stealer malware to Ransomware-as-a-Service platforms have led to new and emerging types of ransomware attacks.

Back 1 ... 4   5   6   7   8   ... 9 Next

Encryption Being Used Correctly

Most ransomware families historically didn't use encryption algorithms correctly, meaning many victim organizations were able to decrypt the data without actually having to pay, according to Malwarebytes' Kujawa.

A lot of the threat actors are new to the space and not professional developers, and struggled with manually creating encryption keys, according to Kujawa. As a result, Kujawa said attackers were often unable to create decryption tools that worked correctly, meaning the victim wouldn't get their data back even if they paid the ransom.

The accuracy of encryption has improved since Microsoft created a new framework for cryptography in Windows and CryptoLocker executed its encryption perfectly, Kujawa said. Ransomware today is typically solidly designed, with most threat actors figuring out how to do encryption correctly en masse.

Back 1 ... 4   5   6   7   8   ... 9 Next

sponsored resources