S.No |
Variant |
Description |
1 |
Apocalypse |
Discovered in 2016, it used a custom algorithm for encryption instead of standard algorithms. It did not create a substantial impact as it was successfully eradicated. |
2 |
Cerber |
Discovered in 2016, this ransomware encrypts files on an infected system using a .cerber extension and uses RSA and RC4 encryption algorithms. |
3 |
CTB_Locker |
Uses a more sophisticated algorithm than RSA, alongside it AES and ECDH algorithms. ECDH is an anonymous protocol that deals with critical agreement. |
4 |
Jigsaw |
Encrypts files on an infected system using the .fun extension, runs on the .NET framework, and uses the AES algorithm. |
5 |
WannaCry |
WannaCry exploited a vulnerability in Windows operating system and wreaked havoc in 2017, infecting more than 400,000 systems across the globe and demanding payments in Bitcoin. |
6 |
Petya |
Petya is considered to be an advanced version of WannaCry. Similarly, it asked for the ransom amount in Bitcoins |
7 |
Conti |
Conti emerged in 2019 and was responsible for 13% of the total attacks in the year 2020. In one instance, the attackers were able to infect a school's system and demanded a ransom of $40 million. The attackers also threatened to post the collected information online if the school did not pay the ransom |
8 |
REvil |
An example of ransomware-as-a-service, which primarily targeted businesses in the engineering sector |