Solved

Full list of ransomwares to date

Posted on 2016-09-05
6
134 Views
Last Modified: 2016-09-10
From our AV & antispam reports, it could not segregate out which ones are ransomware.
I'll need this for management report.

Anyone has a list of ransomware names to date?


Attached is a list which I'm seeing happening lately:
can help identify which ones are ransomware, thanks.
Malwares.xlsx
0
Comment
Question by:sunhux
6 Comments
 
LVL 16

Assisted Solution

by:Dirk Mare
Dirk Mare earned 80 total points
ID: 41784635
I got this link to Trend Micro Ransomware report in email not to long ago, it has some interesting info..

Report

DirkMare
0
 
LVL 27

Accepted Solution

by:
Thomas Zucker-Scharff earned 180 total points
ID: 41784685
Go to id-ransomware  (https://id-ransomware.malwarehunterteam.com) the list is there.  You can also ask for an api key to mirror the list.
0
 
LVL 5

Assisted Solution

by:Laroy Shtotland
Laroy Shtotland earned 90 total points
ID: 41784723
1
Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

 
LVL 63

Assisted Solution

by:btan
btan earned 150 total points
ID: 41784886
Specific to AV mapping for Ransomware, good to check out AV dictionary per se like the case for
- Symantec SEP @ https://www.symantec.com/security_response/landing/azlisting.jsp 
- McAfee AV @ http://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware
- Microsoft @ https://www.microsoft.com/en-us/security/portal/threat/encyclopedia/Entry.aspx

One good place to search AV names is
- Threatminer @ https://www.threatminer.org/index.php,
-  @ https://www.metaflows.com/stats/malware_names/
They may not be having all so final resort is Google which will be safer bet fro confirmation

For the family name and group, you can check out the EE article e.g. https://www.experts-exchange.com/articles/21199/Ransomware-Beware.html but the Ransomware is always being updated due to growth and emerging variant and copycats, hence I suggest you can check out IDRansomware for a baseline - see its FAQ on which ransomware they detect. https://id-ransomware.malwarehunterteam.com/

For new update, follow the Bleedingcomputer, for a list of new ones in its weekly updates, one example is the recent one http://www.bleepingcomputer.com/news/security/the-week-in-ransomware-september-2nd-2016-fairware-cerber3-and-central-security-treatment-organization/

See attached. No specific hit but possibility of relation to ransomware are suggested
Malwares-suggested.xlsx
1
 

Author Comment

by:sunhux
ID: 41784898
https://id-ransomware.malwarehunterteam.com
Around mid last month, ran into *.zepto ransomware but this Zepto is not listed above or
is it a sub-strain of the various locky;  if so which locky ransomware it comes under?
0
 
LVL 63

Expert Comment

by:btan
ID: 41784906
Yes it is variant of locky
0

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

One of the biggest threats in the cyber realm pertains to advanced persistent threats (APTs). This paper is a compare and contrast of Russian and Chinese APT's.
There's a lot of hype surrounding blockchain technology. Here's how it works and some of the novel ways it' s now being used - including for data protection.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question