Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

How to analyze Ransomware with ANY.RUN

Top malware of this type

Family
Type
Trend changes
Tasks overall
  • 2

    Netwalker

    Ransomware
    0,0,0,0,0,0,0,0,0,0,0,0,0,0,16,93,45,40,40,44,13,4,7,3,3,0,1,15,3,6,5,1,3,3,0,0,1,1,5,1,3,0,1,0,5,3,3,4,1,5,1,1
    116
    507
  • 3

    Gunra

    Ransomware
    0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,29,16,8,5,2
    156
    91
  • 4

    Black Basta

    Ransomware
    0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,15,30,12,12,4,13,9,10,13,4,1
    134
    305
  • 5

    Phobos

    Ransomware
    0,0,0,0,0,0,0,0,0,20,23,42,8,4,47,24,31,37,39,34,30,17,37,37,20,32,20,30,43,20,28,25,53,33,6,0,0,9,5,5,60,114,33,14,20,23,34,50,27,26,9,15
    76
    1784
  • 6

    Bert Ransomware

    Ransomware
    0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,9,1,7,0
    165
    28
  • 7

    INC Ransomware

    Ransomware
    0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,1,1,16,14,70,13,56,25,26,21,72,52
    118
    500
  • 8

    WannaCry

    Ransomware
    0,0,41,38,41,52,38,56,79,87,115,143,207,221,235,377,337,216,329,403,459,560,352,401,342,411,354,505,454,436,441,574,604,818,722,777,843,1226,1021,1461,1148,584,592,1290,1085,1446,1325,800,457,741,989,479
    10
    38382
  • 9

    LockBit

    Ransomware
    0,0,0,0,0,0,0,0,0,0,0,0,0,0,11,16,23,8,27,31,11,8,14,31,15,15,13,25,18,37,10,18,20,14,1,85,78,107,96,122,169,221,357,108,141,108,230,222,409,269,299,282
    43
    5202
  • 10

    Interlock

    Ransomware
    0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,3,97,8,7,4,7,15,9,4,2
    148
    179
  • 11

    Qilin Ransomware

    Ransomware
    0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,9,12,16,23,31,56
    140
    240
  • Last Seen at

    Recent blog posts

    post image
    How Threat Intelligence Helps Protect Financi...
    watchers 399
    comments 0
    post image
    Release Notes: Workflow Improvements, MISP In...
    watchers 2185
    comments 0
    post image
    Enterprise Phishing: How Attackers Abuse Trus...
    watchers 4261
    comments 0

    What is Ransomware?

    Ransomware is malware that restricts access to a computer system or its data until a ransom is paid. This can be done in a variety of ways.

    For instance, screen locker ransomware blocks access to the system by overlaying the display with a ransom note window, prompting the user to make a payment to get control over the machine back.

    However, the primary type of ransomware used by attackers nowadays is crypto-ransomware, which specifically uses encryption to hold data hostage. This means that the attacker scrambles the victim's files using a strong encryption algorithm, making them unreadable without the decryption key that can be obtained only after paying a ransom.

    At the same time, some malware may employ fake encryption as a deceptive tactic to instill fear and pressure victims into paying ransoms. For example, STRRAT, a Java-based malware, is known for appending the .crimson extension to victims' files. However, this encryption is merely a superficial disguise, as users can easily restore access to their files by manually removing the added extension.

    Certain strains of wiper malware disguise themselves as ransomware, exploiting victims' desperation for data recovery. These malicious programs permanently destroy files while falsely promising decryption upon ransom payment.

    Get started today for free

    Analyze malware and phishing in a fully-interactive sandbox

    Create free account

    What is a ransomware attack?

    A ransomware attack is the process by which cybercriminals infiltrate a computer system or network and deploy malicious software that encrypts or locks critical data, rendering it inaccessible to the owner.

    Ransomware attacks can target individuals, businesses, and organizations of all sizes, causing significant disruption, financial losses, and reputational damage. The attackers often exploit vulnerabilities in software, operating systems, or human behavior.

    While attackers often promise to restore the victim’s access to their system once they pay a fee, there is never a guarantee they will do it. In many cases, attackers simply take the money and disappear. On top of that, paying criminals further encourages them to continue carrying out illicit activities.

    How does ransomware work?

    Although how ransomware works depends on particular malware families, it usually begins with system infiltration through various means, such as phishing emails, malicious links, or software vulnerabilities.

    Most frequently, once the ransomware is installed on a victim's device, it will encrypt the victim's files, making them unreadable. The attacker will then display a message, often in the form of a text file or a separate window, demanding a payment to be made in cryptocurrency or other hard-to-trace method of payment.

    Analyze malware for free in a fully interactive cloud sandbox – sign up now!

    The exact amount of the ransom demand can vary widely. For instance, the WannaCry ransomware requested $300 to be paid within 3 days, when targeting individuals, while organizations that suffered an extensive network infection had to fork out millions of dollars. In their turn, the criminals behind LostTrust require their victims to pay at least $100,000.

    Wannacry ransom note A desktop displaying the WannaCry ransom note

    Let’s use the LockBit malware family to see how a typical ransomware works:

    • Upon gaining initial access, LockBit typically operates via the command line, accepting file or directory parameters for selective encryption. It can also execute its attack through scheduled tasks or PowerShell Empire.
    • LockBit utilizes tools like Mimikatz to gather additional credentials, expanding its potential impact. To evade detection, it employs different tools to disable security software, while programs, such as Network Scanner enable it to identify Domain Controllers or Active Directory servers for ransomware deployment.
    • The ransomware spreads within the network by self-propagating via SMB connections using acquired credentials. It also exfiltrates data using cloud storage services like MEGA. Afterwards, LockBit encrypts both local and network data using AES and replaces the desktop wallpaper with a ransom note.

    LockBit process graph LockBit 1.0 process graph

    What does ransomware do to an endpoint device?

    Ransomware deals a serious blow to endpoint devices, causing several major detrimental effects:

    • Data Encryption: It encrypts critical files belonging to the user, making them impossible to open. It does by applying an encryption algorithm and changing the extensions of files.
    • System Disruption: It can disrupt normal system operations, causing crashes, performance issues, and data loss.
    • Access Denial: Infected devices may become completely unusable, preventing users from accessing their data or performing essential tasks. Attackers often limit users’ ability to interact with the system to the window with the ransom demands.
    • Data Exfiltration: Ransomware may also steal sensitive data, further compromising privacy and security. In some cases, criminals may publish the information stolen from their victims, especially high-profile organizations, if they refuse to pay. This adds another pressure point and often forces companies to comply with the demands.

    What are examples of ransomware families?

    In order to track both active and no longer operational ransomware families, use ANY.RUN’s Malware Trends Tracker.

    Here are some of the notable examples of ransomware, according to the service:

    • WannaCry: A self-propagating ransomware, exploiting the EternalBlue vulnerability to infiltrate and spread across vulnerable networks. Since its emergence in 2017, this malware has caused billions of dollars in damages and infected over 200,000 computers globally. As of 2023, the ransomware is no longer active.
    • LockBit: A prominent ransomware strain, operating under the Malware-as-a-Service model, which fuels its widespread adoption. According to some estimates, LockBit is responsible for up to 40% of all ransomware attacks. It targets organizations of all sizes, from large corporations like Royal Mail, where a $80 million ransom was demanded, to smaller businesses.
    • LostTrust: LostTrust is a relatively new ransomware strain that emerged in March 2023. It employs a multi-extortion strategy, not only encrypting data on the victim's system but also exfiltrating sensitive files for additional leverage. The perpetrators then publish the stolen data on a dedicated website, showcasing a growing list of compromised organizations.

    How does ransomware spread?

    Phishing emails serve as the primary weapon of choice for ransomware attackers. These carefully crafted messages, often disguised as legitimate communications from trusted entities like banks or online services, aim to deceive recipients into clicking malicious links or opening infected attachments.

    Ransomware can also move laterally, which is to spread across the entire network of computers, once it gains a foothold on one of them. Additionally, many malware families are distributed via file sharing services, where they can be masqueraded as legitimate software.

    Alternatively, ransomware can end up on systems through the means of loaders, special malware designs with the sole purpose of distributing other malicious programs.

    How to prevent ransomware attack

    Ransomware is an extremely widespread type of malware and knowing how to protect from ransomware is essential for every organization valuing its cybersecurity. A comprehensive defense stack against attacks consists of multiple solutions, including the malware sandbox that can be employed in different scenarios.

    For instance, infections stemming from phishing emails and websites can be avoided, if a sandbox is first used to analyze them. The ANY.RUN malware sandbox lets you quickly determine whether a file or link poses a threat by uploading it to the service. ANY.RUN produces a detailed report featuring the verdict on the sample’s maliciousness and relevant indicators of compromise (IOCs) that can be used for detection.

    WannaCry sample report ANY.RUN report on a WannaCry sample

    On top of that, the sandbox is fully interactive, meaning you can engage with malicious files and links in a safe cloud virtual machine like you would on a normal computer.

    Try ANY.RUN for free – request a demo!

    HAVE A LOOK AT

    Cactus Ransomware screenshot
    Cactus ransomware-as-a-service (RaaS) was first caught in March 2023 targeting corporate networks. It became known for its self-encrypting payload and double extortion tactics. Cactus primarily targets large enterprises across industries in finance, manufacturing, IT, and healthcare. It is known for using custom encryption techniques, remote access tools, and penetration testing frameworks to maximize damage.
    Read More
    VanHelsing Ransomware screenshot
    VanHelsing is a sophisticated ransomware strain that appeared in early 2025, operating via the Ransomware-as-a-Service (RaaS) model and targeting primarily USA and France. It threatens mostly Windows systems but has variants for Linux, BSD, ARM, and ESXi, making it a multi-platform malware. It is also notable for its advanced evasion techniques, double extortion tactics, and rapid evolution.
    Read More
    Virlock screenshot
    Virlock
    virlock
    Virlock is a unique ransomware strain that combines encryption capabilities with file infection techniques. First observed in 2014, it stands out due to its polymorphic nature and ability to embed its code into compromised files, ensuring continued propagation. Once it infects a system, it encrypts files and locks the screen, demanding a ransom for file recovery and system access.
    Read More
    CryptoWall screenshot
    CryptoWall
    cryptowall
    CryptoWall is a notorious ransomware family that emerged in early 2014 and rapidly became one of the most destructive cyber threats of its time. This malware encrypts victims' files using strong AES encryption, demands ransom payments in Bitcoin, and has generated hundreds of millions of dollars for cybercriminals.
    Read More
    Jigsaw screenshot
    Jigsaw
    jigsaw
    The Jigsaw ransomware, initially detected in 2016, encrypts files on compromised systems and requires a ransom payment in Bitcoin. If the ransom is not paid, the malware starts deleting files, increasing the pressure on victims to comply. Its source code is publicly accessible, allowing various threat actors to customize and repurpose the malware for different objectives.
    Read More
    Cephalus screenshot
    Cephalus
    cephalus
    Cephalus is a targeted ransomware threat discovered in 2025. It’s known for infiltrating organizations that deal with sensitive data through compromised RDP access. It leverages DLL sideloading with a legitimate SentinelOne executable. Cephalus is able to exfiltrate data and destroy backup options. Its payload is also tailored to each victim, which makes identification and mitigation more complex.
    Read More