Ransomware
A look back
1989 - First known ransomware, "AIDS" trojan.
Released into the world through snail mail using 5¼” floppy disks.
Initially popular in Russia.
Types of ransomware
Locker ransomware: Computer locker
Denies access to the computer or device.
Crypto ransomware: Data locker
Prevents access to files or data.
Reveton
Cryptowall
CryptoLocker.F and
TorrentLocker
RSA4096
KeRanger
Cryptolocker
Notable examples
Targets
Home Users Businesses
Public
Agencies
Impacted systems
Personal
Computers
Servers
Mobile
Devices
How ransomware infects
Traffic Distribution System (TDS)
Malvertisement
Spam email
Downloaders & botnets
Social Engineering
2012
US$400,000
More than
US$1.1 million
2014
2015
More than
US$18 million
Profits from ransomware
Countries impacted by ransomware
USA Japan UK Italy Germany Russia
Canada Australia India Netherlands Brazil Turkey
Reference: Wikipedia | Securityweek | Statista | PCMagazine | PCWorld | TheHackerNews
Payment Methods
Payment vouchers such as Payment
systems, Paysafecard, MoneyPak,
UKash, CashU, and MoneXy for
Locker ransomware
Bitcoins for crypto ransomware

More Related Content

PDF
Analysing Ransomware
PDF
PPTX
র‌্যানসমওয়্যার
PPTX
Ransomware: Mitigation Through Preparation
PPTX
Ransomware the clock is ticking
PDF
Ransomware hostage rescue manual
PPTX
Ransomware
PDF
Ransomware: History, Analysis, & Mitigation - PDF
Analysing Ransomware
র‌্যানসমওয়্যার
Ransomware: Mitigation Through Preparation
Ransomware the clock is ticking
Ransomware hostage rescue manual
Ransomware
Ransomware: History, Analysis, & Mitigation - PDF

What's hot (20)

PPTX
News Bytes
PPTX
Ransomware by lokesh
PPTX
Ransomware - Impact, Evolution, Prevention
PPTX
Ransomware
PDF
Malwares
PPT
Ransomware - The Growing Threat
PPTX
Ransomware
PDF
WHITE PAPER▶ The Evolution of Ransomware
PPTX
Ransomware Attack
PPT
Malware by Ms. Allwood
PDF
What is Ransomware?
PDF
What is Ransomware? A Quick Guide
PDF
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...
PPTX
Ransomware: WanaCry, WanCrypt
PDF
Ransomware attacks 2017
PPTX
Cryptolocker Ransomware Attack
PPTX
Trojan virus & backdoors
PPT
Ransomware: Prevention, privacy and your options post-breach
PPTX
popular windows applications
PPTX
The Malware Menace
News Bytes
Ransomware by lokesh
Ransomware - Impact, Evolution, Prevention
Ransomware
Malwares
Ransomware - The Growing Threat
Ransomware
WHITE PAPER▶ The Evolution of Ransomware
Ransomware Attack
Malware by Ms. Allwood
What is Ransomware?
What is Ransomware? A Quick Guide
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...
Ransomware: WanaCry, WanCrypt
Ransomware attacks 2017
Cryptolocker Ransomware Attack
Trojan virus & backdoors
Ransomware: Prevention, privacy and your options post-breach
popular windows applications
The Malware Menace
Ad

Similar to Ransomware - A look back (20)

PPTX
Meeting02_RoT.pptx
PPTX
Ransomware History and Monitoring Tips
PDF
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
PDF
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
PDF
A comprehensive survey ransomware attacks prevention, monitoring and damage c...
PDF
CSF18 - The Digital Threat of the Decade (Century) - Sasha Kranjac
PDF
The rise of malware(ransomware)
PDF
Ransomware all locked up book
PPT
CyberSecurity presentation for basic knowledge about this topic
PDF
Ethical Hacking
PPTX
EverSec + Cyphort: Big Trends in Cybersecurity
PPTX
Hacking by Pratyush Gupta
PPTX
PPT
Hacking 1224807880385377-9
PPTX
External threats-to-information-system
PPT
Cyber-Security-20211013105857.ppt
PPTX
Ransomware- A reality check (Part 1).pptx
PPT
Chapter 3 Computer Crimes
PDF
xu the ma doc tấn công các trang web và thương mại .pdf
PDF
xu the ma doc tấn công các trang web và thương mại .pdf
Meeting02_RoT.pptx
Ransomware History and Monitoring Tips
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
A comprehensive survey ransomware attacks prevention, monitoring and damage c...
CSF18 - The Digital Threat of the Decade (Century) - Sasha Kranjac
The rise of malware(ransomware)
Ransomware all locked up book
CyberSecurity presentation for basic knowledge about this topic
Ethical Hacking
EverSec + Cyphort: Big Trends in Cybersecurity
Hacking by Pratyush Gupta
Hacking 1224807880385377-9
External threats-to-information-system
Cyber-Security-20211013105857.ppt
Ransomware- A reality check (Part 1).pptx
Chapter 3 Computer Crimes
xu the ma doc tấn công các trang web và thương mại .pdf
xu the ma doc tấn công các trang web và thương mại .pdf
Ad

More from SecPod Technologies (20)

PDF
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
PDF
8 Types of Cyber Attacks That Can Bother CISOs in 2020
PDF
Security threats
PDF
Hacking Internet of Things (IoT)
PDF
WHY MSSPs LOVE OUR SOLUTION
PDF
Many products-no-security (1)
PDF
SanerNow Endpoint Management
PDF
SanerNow Asset Management
PDF
SanerNow Patch Management
PDF
SanerNow Vulnerability Management
PDF
SanerNow platform-datasheet
PDF
Many products-no-security
PDF
SanerNow a platform for Endpoint security and systems Management
PDF
Healthcare's Fight Against Ransomware
PPTX
Take a sneak peek into Saner 2.0
PPTX
Msp saner 2.0
PPTX
PDF
Saner 2.0 product sheet
PDF
End point security - SecPod Saner
PDF
Worst security data breaches till 2015 - SecPod
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
8 Types of Cyber Attacks That Can Bother CISOs in 2020
Security threats
Hacking Internet of Things (IoT)
WHY MSSPs LOVE OUR SOLUTION
Many products-no-security (1)
SanerNow Endpoint Management
SanerNow Asset Management
SanerNow Patch Management
SanerNow Vulnerability Management
SanerNow platform-datasheet
Many products-no-security
SanerNow a platform for Endpoint security and systems Management
Healthcare's Fight Against Ransomware
Take a sneak peek into Saner 2.0
Msp saner 2.0
Saner 2.0 product sheet
End point security - SecPod Saner
Worst security data breaches till 2015 - SecPod

Recently uploaded (20)

PDF
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
PDF
How Tridens DevSecOps Ensures Compliance, Security, and Agility
PDF
E-Commerce Website Development Companyin india
PDF
Practical Indispensable Project Management Tips for Delivering Successful Exp...
PPTX
Weekly report ppt - harsh dattuprasad patel.pptx
PPTX
Trending Python Topics for Data Visualization in 2025
PDF
Topaz Photo AI Crack New Download (Latest 2025)
PPTX
Introduction to Windows Operating System
PPTX
GSA Content Generator Crack (2025 Latest)
PPTX
Download Adobe Photoshop Crack 2025 Free
PPTX
Full-Stack Developer Courses That Actually Land You Jobs
PPTX
Cybersecurity: Protecting the Digital World
PDF
AI/ML Infra Meetup | Beyond S3's Basics: Architecting for AI-Native Data Access
PDF
Visual explanation of Dijkstra's Algorithm using Python
PDF
iTop VPN Crack Latest Version Full Key 2025
PDF
CCleaner 6.39.11548 Crack 2025 License Key
PDF
BoxLang Dynamic AWS Lambda - Japan Edition
PDF
AI/ML Infra Meetup | LLM Agents and Implementation Challenges
PPTX
Tech Workshop Escape Room Tech Workshop
PPTX
Cybersecurity-and-Fraud-Protecting-Your-Digital-Life.pptx
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
How Tridens DevSecOps Ensures Compliance, Security, and Agility
E-Commerce Website Development Companyin india
Practical Indispensable Project Management Tips for Delivering Successful Exp...
Weekly report ppt - harsh dattuprasad patel.pptx
Trending Python Topics for Data Visualization in 2025
Topaz Photo AI Crack New Download (Latest 2025)
Introduction to Windows Operating System
GSA Content Generator Crack (2025 Latest)
Download Adobe Photoshop Crack 2025 Free
Full-Stack Developer Courses That Actually Land You Jobs
Cybersecurity: Protecting the Digital World
AI/ML Infra Meetup | Beyond S3's Basics: Architecting for AI-Native Data Access
Visual explanation of Dijkstra's Algorithm using Python
iTop VPN Crack Latest Version Full Key 2025
CCleaner 6.39.11548 Crack 2025 License Key
BoxLang Dynamic AWS Lambda - Japan Edition
AI/ML Infra Meetup | LLM Agents and Implementation Challenges
Tech Workshop Escape Room Tech Workshop
Cybersecurity-and-Fraud-Protecting-Your-Digital-Life.pptx

Ransomware - A look back

  • 1. Ransomware A look back 1989 - First known ransomware, "AIDS" trojan. Released into the world through snail mail using 5¼” floppy disks. Initially popular in Russia. Types of ransomware Locker ransomware: Computer locker Denies access to the computer or device. Crypto ransomware: Data locker Prevents access to files or data. Reveton Cryptowall CryptoLocker.F and TorrentLocker RSA4096 KeRanger Cryptolocker Notable examples Targets Home Users Businesses Public Agencies Impacted systems Personal Computers Servers Mobile Devices How ransomware infects Traffic Distribution System (TDS) Malvertisement Spam email Downloaders & botnets Social Engineering 2012 US$400,000 More than US$1.1 million 2014 2015 More than US$18 million Profits from ransomware Countries impacted by ransomware USA Japan UK Italy Germany Russia Canada Australia India Netherlands Brazil Turkey Reference: Wikipedia | Securityweek | Statista | PCMagazine | PCWorld | TheHackerNews Payment Methods Payment vouchers such as Payment systems, Paysafecard, MoneyPak, UKash, CashU, and MoneXy for Locker ransomware Bitcoins for crypto ransomware