The 4 Most Common Kinds of Ransomware


The 4 Most Common Kinds of Ransomware

You must know how to defend against one of the most common types of hacking software – ransomware.

Cyber Security is an issue that almost every single modern business has to be worried about. After all, nearly every company, no matter the size, depends on a computer system in one form or another. Protecting your data against harmful cyber-criminals is vital for many different reasons. You might have sensitive information regarding customers, employees, products, business plans, financial records, and more that you cannot afford to have compromised. That is why you must know how to defend against one of the most common types of hacking software – ransomware.

Ransomware – What is it?

Ransomware is a malicious type of software that breaches computer systems, much like malware. Only cyber-criminals use ransomware to hack a device, then gaining access to whatever data they find. They then hold the data on the device hostage, unless they are paid a ransom. Here are the five most common kinds of ransomware. 


Cerber is a relatively newer ransomware that was developed back in 2017. However, what makes it so deadly is that the decryptor for each variant is compatible with 12 multiple languages. This made it much easier for the creator to create an affiliate system, essentially creating a ransomware-as-a-service platform that endued in huge profits for the creator separate from their independent cyber-attacks. Cerber usually targets cloud-based Office 365 users through an elaborate phishing campaign.


Locky is a form of ransomware that’s spread through spam, often disguised as an email message that looks like an invoice. Once opened, the user is instructed to activate macros to read it. Once the user does this, the ransomware will start encrypting files, requesting a ransom to unlock them.


Crylocker is ransomware that personalizes the ransom note by using data it locates on the user’s computer, such as the user’s name, location, birthday, system details, IP address, or Facebook account to pressure the user. From here, it locks the user out of their computer and requests payment within 24 hours.


Jigsaw is a dangerous form of ransomware in that it will encrypt your files and start deleting them automatically until the ransom is paid in full. It deletes one or more files every hour throughout a 72-hour period. Once the 72 hours are over, all of the files that were encrypted will be removed.

En-Net Services Can Help Today

Experience a superior method of getting the public sector technology solutions you need through forming a partnership with En-Net Services. Our seasoned team members are familiar with the distinct purchasing and procurement cycles of state and local governments, as well as FederalK-12 education, and higher education entities. En-Net is a certified Maryland Small Business Reserve with contract vehicles and sub-contracting partnerships to meet all contracting requirements.

To find out more about our hardware servicesprinting, and imaging services, or to hear more about how a dynamic team can help meet your information technology needs, send us an email or give us a call at (301)-846-9901 today!

This entry was posted on Thursday, November 14th, 2019 at 10:28 am. Both comments and pings are currently closed.

Contact Us for more information