Solved

Full list of ransomwares to date

Posted on 2016-09-05
6
150 Views
Last Modified: 2016-09-10
From our AV & antispam reports, it could not segregate out which ones are ransomware.
I'll need this for management report.

Anyone has a list of ransomware names to date?


Attached is a list which I'm seeing happening lately:
can help identify which ones are ransomware, thanks.
Malwares.xlsx
0
Comment
Question by:sunhux
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
6 Comments
 
LVL 16

Assisted Solution

by:Dirk Mare
Dirk Mare earned 80 total points
ID: 41784635
I got this link to Trend Micro Ransomware report in email not to long ago, it has some interesting info..

Report

DirkMare
0
 
LVL 28

Accepted Solution

by:
Thomas Zucker-Scharff earned 180 total points
ID: 41784685
Go to id-ransomware  (https://id-ransomware.malwarehunterteam.com) the list is there.  You can also ask for an api key to mirror the list.
0
 
LVL 5

Assisted Solution

by:Laroy Shtotland
Laroy Shtotland earned 90 total points
ID: 41784723
1
The Ultimate Checklist to Optimize Your Website

Websites are getting bigger and complicated by the day. Video, images, custom fonts are all great for showcasing your product/service. But the price to pay in terms of reduced page load times and ultimately, decreased sales, can lead to some difficult decisions about what to cut.

 
LVL 64

Assisted Solution

by:btan
btan earned 150 total points
ID: 41784886
Specific to AV mapping for Ransomware, good to check out AV dictionary per se like the case for
- Symantec SEP @ https://www.symantec.com/security_response/landing/azlisting.jsp 
- McAfee AV @ http://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware
- Microsoft @ https://www.microsoft.com/en-us/security/portal/threat/encyclopedia/Entry.aspx

One good place to search AV names is
- Threatminer @ https://www.threatminer.org/index.php,
-  @ https://www.metaflows.com/stats/malware_names/
They may not be having all so final resort is Google which will be safer bet fro confirmation

For the family name and group, you can check out the EE article e.g. https://www.experts-exchange.com/articles/21199/Ransomware-Beware.html but the Ransomware is always being updated due to growth and emerging variant and copycats, hence I suggest you can check out IDRansomware for a baseline - see its FAQ on which ransomware they detect. https://id-ransomware.malwarehunterteam.com/

For new update, follow the Bleedingcomputer, for a list of new ones in its weekly updates, one example is the recent one http://www.bleepingcomputer.com/news/security/the-week-in-ransomware-september-2nd-2016-fairware-cerber3-and-central-security-treatment-organization/

See attached. No specific hit but possibility of relation to ransomware are suggested
Malwares-suggested.xlsx
1
 

Author Comment

by:sunhux
ID: 41784898
https://id-ransomware.malwarehunterteam.com
Around mid last month, ran into *.zepto ransomware but this Zepto is not listed above or
is it a sub-strain of the various locky;  if so which locky ransomware it comes under?
0
 
LVL 64

Expert Comment

by:btan
ID: 41784906
Yes it is variant of locky
0

Featured Post

Use Case: Protecting a Hybrid Cloud Infrastructure

Microsoft Azure is rapidly becoming the norm in dynamic IT environments. This document describes the challenges that organizations face when protecting data in a hybrid cloud IT environment and presents a use case to demonstrate how Acronis Backup protects all data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

An introduction to the wonderful sport of Scam Baiting.  Learn how to help fight scammers by beating them at their own game. This great pass time helps the world, while providing an endless source of entertainment. Enjoy!
When it comes to security, close monitoring is a must. According to WhiteHat Security annual report, a substantial number of all web applications are vulnerable always. Monitis offers a new product - fully-featured Website security monitoring and pr…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question