?
Solved

Full list of ransomwares to date

Posted on 2016-09-05
6
Medium Priority
?
159 Views
Last Modified: 2016-09-10
From our AV & antispam reports, it could not segregate out which ones are ransomware.
I'll need this for management report.

Anyone has a list of ransomware names to date?


Attached is a list which I'm seeing happening lately:
can help identify which ones are ransomware, thanks.
Malwares.xlsx
0
Comment
Question by:sunhux
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
6 Comments
 
LVL 16

Assisted Solution

by:Dirk Mare
Dirk Mare earned 320 total points
ID: 41784635
I got this link to Trend Micro Ransomware report in email not to long ago, it has some interesting info..

Report

DirkMare
0
 
LVL 29

Accepted Solution

by:
Thomas Zucker-Scharff earned 720 total points
ID: 41784685
Go to id-ransomware  (https://id-ransomware.malwarehunterteam.com) the list is there.  You can also ask for an api key to mirror the list.
0
 
LVL 5

Assisted Solution

by:Laroy Shtotland
Laroy Shtotland earned 360 total points
ID: 41784723
1
Get real performance insights from real users

Key features:
- Total Pages Views and Load times
- Top Pages Viewed and Load Times
- Real Time Site Page Build Performance
- Users’ Browser and Platform Performance
- Geographic User Breakdown
- And more

 
LVL 64

Assisted Solution

by:btan
btan earned 600 total points
ID: 41784886
Specific to AV mapping for Ransomware, good to check out AV dictionary per se like the case for
- Symantec SEP @ https://www.symantec.com/security_response/landing/azlisting.jsp 
- McAfee AV @ http://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware
- Microsoft @ https://www.microsoft.com/en-us/security/portal/threat/encyclopedia/Entry.aspx

One good place to search AV names is
- Threatminer @ https://www.threatminer.org/index.php,
-  @ https://www.metaflows.com/stats/malware_names/
They may not be having all so final resort is Google which will be safer bet fro confirmation

For the family name and group, you can check out the EE article e.g. https://www.experts-exchange.com/articles/21199/Ransomware-Beware.html but the Ransomware is always being updated due to growth and emerging variant and copycats, hence I suggest you can check out IDRansomware for a baseline - see its FAQ on which ransomware they detect. https://id-ransomware.malwarehunterteam.com/

For new update, follow the Bleedingcomputer, for a list of new ones in its weekly updates, one example is the recent one http://www.bleepingcomputer.com/news/security/the-week-in-ransomware-september-2nd-2016-fairware-cerber3-and-central-security-treatment-organization/

See attached. No specific hit but possibility of relation to ransomware are suggested
Malwares-suggested.xlsx
1
 

Author Comment

by:sunhux
ID: 41784898
https://id-ransomware.malwarehunterteam.com
Around mid last month, ran into *.zepto ransomware but this Zepto is not listed above or
is it a sub-strain of the various locky;  if so which locky ransomware it comes under?
0
 
LVL 64

Expert Comment

by:btan
ID: 41784906
Yes it is variant of locky
0

Featured Post

VIDEO: THE CONCERTO CLOUD FOR HEALTHCARE

Modern healthcare requires a modern cloud. View this brief video to understand how the Concerto Cloud for Healthcare can help your organization.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The Cyber News Rundown brings you the latest happenings in cyber news weekly. Who am I? I’m Connor Madsen, a Webroot Threat Research Analyst, and a guy with a passion for all things security. Any more questions? Just ask.
A look at what happened in the Verizon cloud breach.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question