Solved

Full list of ransomwares to date

Posted on 2016-09-05
6
140 Views
Last Modified: 2016-09-10
From our AV & antispam reports, it could not segregate out which ones are ransomware.
I'll need this for management report.

Anyone has a list of ransomware names to date?


Attached is a list which I'm seeing happening lately:
can help identify which ones are ransomware, thanks.
Malwares.xlsx
0
Comment
Question by:sunhux
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
6 Comments
 
LVL 16

Assisted Solution

by:Dirk Mare
Dirk Mare earned 80 total points
ID: 41784635
I got this link to Trend Micro Ransomware report in email not to long ago, it has some interesting info..

Report

DirkMare
0
 
LVL 27

Accepted Solution

by:
Thomas Zucker-Scharff earned 180 total points
ID: 41784685
Go to id-ransomware  (https://id-ransomware.malwarehunterteam.com) the list is there.  You can also ask for an api key to mirror the list.
0
 
LVL 5

Assisted Solution

by:Laroy Shtotland
Laroy Shtotland earned 90 total points
ID: 41784723
1
Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

 
LVL 63

Assisted Solution

by:btan
btan earned 150 total points
ID: 41784886
Specific to AV mapping for Ransomware, good to check out AV dictionary per se like the case for
- Symantec SEP @ https://www.symantec.com/security_response/landing/azlisting.jsp 
- McAfee AV @ http://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware
- Microsoft @ https://www.microsoft.com/en-us/security/portal/threat/encyclopedia/Entry.aspx

One good place to search AV names is
- Threatminer @ https://www.threatminer.org/index.php,
-  @ https://www.metaflows.com/stats/malware_names/
They may not be having all so final resort is Google which will be safer bet fro confirmation

For the family name and group, you can check out the EE article e.g. https://www.experts-exchange.com/articles/21199/Ransomware-Beware.html but the Ransomware is always being updated due to growth and emerging variant and copycats, hence I suggest you can check out IDRansomware for a baseline - see its FAQ on which ransomware they detect. https://id-ransomware.malwarehunterteam.com/

For new update, follow the Bleedingcomputer, for a list of new ones in its weekly updates, one example is the recent one http://www.bleepingcomputer.com/news/security/the-week-in-ransomware-september-2nd-2016-fairware-cerber3-and-central-security-treatment-organization/

See attached. No specific hit but possibility of relation to ransomware are suggested
Malwares-suggested.xlsx
1
 

Author Comment

by:sunhux
ID: 41784898
https://id-ransomware.malwarehunterteam.com
Around mid last month, ran into *.zepto ransomware but this Zepto is not listed above or
is it a sub-strain of the various locky;  if so which locky ransomware it comes under?
0
 
LVL 63

Expert Comment

by:btan
ID: 41784906
Yes it is variant of locky
0

Featured Post

Resolve Critical IT Incidents Fast

If your data, services or processes become compromised, your organization can suffer damage in just minutes and how fast you communicate during a major IT incident is everything. Learn how to immediately identify incidents & best practices to resolve them quickly and effectively.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The next five years are sure to bring developments that are just astonishing, and we will continue to try to find the balance between connectivity and security. Here are five major technological developments from the last five years and some predict…
Many businesses neglect disaster recovery and treat it as an after-thought. I can tell you first hand that data will be lost, hard drives die, servers will be hacked, and careless (or malicious) employees can ruin your data.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

696 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question