Encrypting ransomware: Locks victims' files through encryption, rendering them inaccessible until a ransom is paid. The attackers hold the decryption key hostage, demanding payment for unlocking the data. Infamous instances of this breed include the WannaCry and NotPetya attacks, which encrypted countless files and caused widespread disruption.
Locker ransomware: Where encrypting ransomware is stealthy, locker ransomware overtly locks users out of their systems. This tactic denies access to the entire computer or specific files until the ransom is paid.
Scareware: Scareware operates on a psychological level, preying on victims' fears and vulnerabilities. It presents fake alerts or warnings, often claiming that the victim's system has been compromised. Scareware capitalizes on the urgency to protect one's digital environment, exploiting emotions to extract ransom payments. Users are coaxed into paying a fee to remove the fabricated threat.
Doxware (leakware): Doxware, also known as leakware, couples encryption with a threat to expose sensitive data if the ransom isn't paid, thus tarnishing an individual's or organization's reputation.
Ransomware as a service (RaaS): Some attackers are offering RaaS to less skilled criminals, who can then execute attacks for a portion of the ransom payment. This commercialization of cyber-extortion democratizes the threat, amplifying its reach and impact by lowering the barrier to entry for potential attackers.