September 8

Cyber Security Threats: Common Ransomware Attacks You Need to Know and Avoid

Ransomware attacks are a major cyber security threat for businesses small and large. Trying to keep up with the latest variants of ransomware is never an easy task. However, an IT service provider can play an important role in preparing your business on how to identify common types of ransomware attacks.

Here are a few of the most prevalent ransomware threats targeting businesses:

Bad Rabbit

Bad Rabbit is a form of ransomware that has impacted organizations throughout Eastern Europe and Russia. Businesses are infected by downloading a fake update for Adobe Flash on a compromised website. Each user is directed to pay .05 bitcoin to regain access to their device.


CryptoLocker has been around for over two decades, but it became more widely known in 2013. Hackers have extorted almost $3 million from many victims, as cybercriminals continue to copy this approach for ransomware schemes.


Cerber is a type of ransomware that targets cloud-based users for Office 365. This complex phishing campaign has impacted millions of users, so it’s essential to train your employees on cyber security best practices to identify potential scams in the workplace.


Crysis encrypts files by using a complex algorithm that makes it nearly impossible to break the code in a short amount of time. Typically, it is spread through attachments in emails.


CryptoWall gained widespread notoriety in 2014, as it’s distributed through spam and exploit kits. Many other variants have also appeared, such as CryptoDefense, CryptoBit, and CryptoWall 2.0/3.0.


CTB-Locker allows hackers to outsource the infection process in exchange for a portion of the profits. This strategy has made it much easier for ransomware to target an even greater number of victims.


Cybercriminals focus on spreading GoldenEye ransomware by targeting a large number of human resource departments. GoldenEye encrypts all of the files on a computer once a file is downloaded by adding a randomize 8-character extension.


Jigsaw will encrypt and eventually delete all of your files until a ransom is paid. Typically, the ransomware will delete a file after the first hour and continue to make deletions until everything is erased at the 72-hour mark.


KeRanger is a strain of ransomware that was initially discovered by a BitTorrent client. This type of ransomware is designed to target Mac OS X applications, but it has yet to be widely distributed.

Total Technology Solutions is an IT provider that specializes in cyber security. We understand the importance of giving your company the best protection against ransomware. Contact us now for a free consultation!

You may also like


{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}

Subscribe to our newsletter now!

full name