12 Notorious
Ransomware Examples

January 12, 2021

In this post, we explore 12 recent ransomware examples to outline the adversaries behind them and how they work:

1. BitPaymer

CrowdStrike Intelligence has been tracking the original BitPaymer since it was first identified in August 2017. In its first iteration, the BitPaymer ransom note included the ransom demand and a URL for a TOR-based payment portal. The payment portal included the title “Bit paymer” along with a reference ID, a Bitcoin (BTC) wallet, and a contact email address. An example of this portal is shown below:

Learn more -> CrowdStrike’s full Bitpaymer analysis.

2. Dharma

Dharma has been in operation since 2016 under a ransomware-as-a-service (RaaS) model, where developers license or sell ransomware to other criminals who then carry out an attack using the malware. Dharma affiliates do not appear to discriminate among industries.

CrowdStrike identified that the original author of Dharma released the source code in 2016 before ceasing activity. Since this threat actor’s departure, Dharma has been marketed and sold by multiple, apparently independent actors, two of which were active in 2019 — and at least one remains active as of January 2020. Separately, while the Phobos ransomware is likely to have been inspired by Dharma, the codebase of Phobos appears separate from Dharma.

Learn more -> Dharma ransomware’s intrusion methods

3. DoppelPaymer

While the first known victims of DoppelPaymer were targeted in June 2019, CrowdStrike was able to recover earlier builds of the malware dating back to April 2019. These earlier builds are missing many of the new features found in later variants, so it is not clear if they were deployed to victims or if they were simply built for testing.

The ransom note used by DoppelPaymer is similar to those used by the original BitPaymer in 2018. The note does not include the ransom amount; however, it does contain a URL for a TOR-based payment portal, and instead of using the keyword KEY to identify the encrypted key, the note uses the keyword DATA as shown in Figure 4.

Learn more -> DoppelPaymer Origins and Analysis

4. GandCrab

GandCrab has established itself as one of the most developed and prevalent ransomware families on the market. Development of the ransomware itself has been driven, in part, by PINCHY SPIDER’s interactions with the cybersecurity research community. GandCrab contains multiple references to members of the research community who are both publicly active on social media and have reported on the ransomware.

PINCHY SPIDER Threat Actor Graphic

PINCHY SPIDER has continued to promote the success of its ransomware in criminal forum posts, often boasting about public reporting of GandCrab incidents. In February, PINCHY SPIDER released version 5.2 of GandCrab, which is immune to the decryption tools developed for earlier versions of GandCrab and in fact, was deployed the day before the release of the latest decryptor.

Recently PINCHY SPIDER has also been observed advertising for individuals with remote desktop protocol (RDP) and VNC (Virtual Network Computing) skills, and spammers who have experience in corporate networking.

Learn more -> How Pinchy Spider deploys GandCrab for ‘Big Game Hunting’

5. Maze

Maze ransomware is a malware targeting organizations worldwide across many industries. It is believed that Maze operates via an affiliated network where Maze developers share their proceeds with various groups that deploy Maze in organizational networks. Maze operators also have a reputation for taking advantage of assets in one network to move laterally to other networks.

Learn more -> CrowdStrike’s technical analysis on maze ransomware.

Learn More

While its explosive growth over the past few years may make it seem otherwise, ransomware didn’t come out of nowhere. Follow along as we outline how ransomware has evolved over the years into a sophisticated weapon for adversaries. Read the History of Ransomware

6. MedusaLocker

MedusaLocker is a ransomware family that was first seen in the wild in early October 2019. In January 2020, a fork of MedusaLocker named Ako was observed, which has been updated to support the use of a Tor hidden service to facilitate a RaaS model. Operators of the Ako version of the malware have since implemented a DLS (see below)

Learn More

Discover which ransomware defense approaches are the most effective by downloading our detailed white paper on: Download: Ransomware Defense: The Do's and Don'ts

7. NetWalker

NetWalker is ransomware written in C++ and advertised as a Ransomware-as-a-Service (RaaS) on forums by a user known to be part of a group designated as CIRCUS SPIDER.

NetWalker encrypts files on the local system, mapped network shares and enumerates the network for additional shares, attempting to access them using the security tokens from all logged-in users on the victim’s system.

Below is an example of their ransom note:

Learn more -> Download Netwalker Ransomware Intelligence Report

8. NotPetya

NotPetya was first detected in 2017 rapidly infiltrating systems across multiple countries. What’s particularly nasty about this family of ransomware is its use of stealthy propagation techniques that allow it to swiftly move laterally to encrypt other systems across an organization. NotPetya ransom notes have demanded $300 USD for each infected machine.

PetrWrap

Learn more -> NotPetya Technical Analysis

9. REvil

On December 9, 2019, a vendor of PINCHY SPIDER’s REvil ransomware as a service (RaaS) posted a threat to leak victim data to an underground forum. This is the first time CrowdStrike Intelligence observed the group or their affiliates making such a threat, and it appeared to be in frustration over failing to monetize compromises at a U.S.-based managed service provider (MSP) and a China-based asset management firm. Since that time, affiliates of PINCHY SPIDER have posted data on more than 80 victims.

Learn more -> REvil Origins and Analysis

10. Ryuk

Ryuk is specifically used to target enterprise environments. Code comparison between versions of Ryuk and Hermes ransomware indicates that Ryuk was derived from the Hermes source code and has been under steady development since its release. Hermes is commodity ransomware that has been observed for sale on forums and used by multiple threat actors. However, Ryuk is only used by WIZARD SPIDER and, unlike Hermes, Ryuk has only been used to target enterprise environments.

Here’s an example of a Ryuk ransom note:

Learn more -> Ryuk Technical Analysis

11. SamSam

Developed and operated by the cyber adversary, BOSS SPIDER, SamSam has been observed using unpatched server-side software to enter an environment. Most notably, SamSam was behind the 2018 ransomware attack on the city of Atlanta, Georgia. The attack left 8,000 city employees without their computers, and citizens were unable to pay their parking water bills and parking tickets.

Below is an example of a SamSam operator’s response after the ransom has been paid. The response typically includes a URL for the victim to download decryption keys.

Learn more -> Lessons learned from SamSam

12. WannaCry

Also referred to as WCry, WanaCrypt, or Wanna, WannaCry was identified in May 2017 during a mass campaign affecting organizations across the globe. WannaCry has targeted healthcare organizations and utility companies using a Microsoft Windows exploit called EternalBlue, which allowed for the sharing of files, thus opening a door for the ransomware to spread.

Learn more -> CrowdStrike’s technical analysis of WannaCry.

Expert Tip

See these real-world examples in action, the sophisticated tactics being used by a variety of advanced persistent threats (APTs), and what you can do to detect them: Watch