{"id":792,"date":"2019-04-04T15:26:04","date_gmt":"2019-04-04T15:26:04","guid":{"rendered":"https:\/\/www.techmagazines.net\/?p=792"},"modified":"2019-04-04T15:30:26","modified_gmt":"2019-04-04T15:30:26","slug":"most-dangerous-ransomware-attacks","status":"publish","type":"post","link":"https:\/\/www.techmagazines.net\/most-dangerous-ransomware-attacks\/","title":{"rendered":"10 Most Dangerous Ransomware Attacks In The Last 10 Years"},"content":{"rendered":"<span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Reading Time: <\/span> <span class=\"rt-time\"> 7<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span><div align=\"justify\"><span style=\"font-weight: 400;\">It was the time when the internet gained popularity. There was not much knowledge about malware and computer virus on the internet. So, everyone followed the humanitarian principles of trust and love. But things got complicated when evil minds with intelligence entered the internet. They introduced viruses, trojans to cause harm to computers all around the world. But it was in 1989, that the seed to a new dangerous program was first sown. Ransomware. In recent times, this very word can cause sleeplessness among the people. In this article, we will focus on 10 most dangerous ransomware attacks in the last 10 years.<\/span><\/p><div id=\"ez-toc-container\" class=\"ez-toc-v2_0_78 counter-hierarchy ez-toc-counter ez-toc-light-blue ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #5ad602;color:#5ad602\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #5ad602;color:#5ad602\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.techmagazines.net\/most-dangerous-ransomware-attacks\/#What_is_Ransomware\" >What is Ransomware?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.techmagazines.net\/most-dangerous-ransomware-attacks\/#1Ransomware_WannaCry\" >1.Ransomware WannaCry<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.techmagazines.net\/most-dangerous-ransomware-attacks\/#2_Ransomware_NotPetya_2017\" >2. Ransomware NotPetya (2017)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.techmagazines.net\/most-dangerous-ransomware-attacks\/#3_Ransomware_Petya_2016\" >3. Ransomware Petya (2016)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.techmagazines.net\/most-dangerous-ransomware-attacks\/#4_Ransomware_LOcky_2016\" >4. Ransomware LOcky (2016)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.techmagazines.net\/most-dangerous-ransomware-attacks\/#5_RansomwareCryptolocker\" >5. RansomwareCryptolocker<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.techmagazines.net\/most-dangerous-ransomware-attacks\/#6_Ransomware_CryptoWall\" >6. Ransomware CryptoWall<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.techmagazines.net\/most-dangerous-ransomware-attacks\/#7_Ransomware_TeslaCrypt_2015\" >7. Ransomware TeslaCrypt (2015)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.techmagazines.net\/most-dangerous-ransomware-attacks\/#8_Ransomware_SimpleLocker_End_Months_of_2015\" >8. Ransomware SimpleLocker (End Months of 2015)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.techmagazines.net\/most-dangerous-ransomware-attacks\/#9_Ransomware_TorrentLocker_2014\" >9. Ransomware TorrentLocker (2014)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/www.techmagazines.net\/most-dangerous-ransomware-attacks\/#10_Ransomware_Reveton_2012\" >10. Ransomware Reveton (2012)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/www.techmagazines.net\/most-dangerous-ransomware-attacks\/#Ransomware_Archievus_2006\" >Ransomware Archievus (2006)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/www.techmagazines.net\/most-dangerous-ransomware-attacks\/#1Ransomware_Ryuk\" >1.Ransomware Ryuk<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/www.techmagazines.net\/most-dangerous-ransomware-attacks\/#2_Ransomware_GandCrab\" >2. Ransomware GandCrab<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/www.techmagazines.net\/most-dangerous-ransomware-attacks\/#3_UnKnown\" >3. UnKnown<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/www.techmagazines.net\/most-dangerous-ransomware-attacks\/#4_Ransomware_Reyptson\" >4. Ransomware Reyptson<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-17\" href=\"https:\/\/www.techmagazines.net\/most-dangerous-ransomware-attacks\/#5_Ransomware_LeakerLocker\" >5. Ransomware LeakerLocker<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-18\" href=\"https:\/\/www.techmagazines.net\/most-dangerous-ransomware-attacks\/#6_Ransomware_WYSIWYE_April_2017\" >6. Ransomware WYSIWYE (April 2017)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-19\" href=\"https:\/\/www.techmagazines.net\/most-dangerous-ransomware-attacks\/#7_Ransomware_Osiris\" >7. Ransomware Osiris<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-20\" href=\"https:\/\/www.techmagazines.net\/most-dangerous-ransomware-attacks\/#8_Ransomware_Cerber\" >8. Ransomware Cerber<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-21\" href=\"https:\/\/www.techmagazines.net\/most-dangerous-ransomware-attacks\/#9_Ransomware_BadRabbit_October_2017\" >9. Ransomware BadRabbit (October 2017)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-22\" href=\"https:\/\/www.techmagazines.net\/most-dangerous-ransomware-attacks\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-793 aligncenter\" src=\"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2019\/04\/10-Most-Dangerous-Ransomware-Attacks-In-The-Last-10-Years.jpg\" alt=\"\" width=\"906\" height=\"340\" srcset=\"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2019\/04\/10-Most-Dangerous-Ransomware-Attacks-In-The-Last-10-Years.jpg 906w, https:\/\/www.techmagazines.net\/wp-content\/uploads\/2019\/04\/10-Most-Dangerous-Ransomware-Attacks-In-The-Last-10-Years-300x113.jpg 300w, https:\/\/www.techmagazines.net\/wp-content\/uploads\/2019\/04\/10-Most-Dangerous-Ransomware-Attacks-In-The-Last-10-Years-768x288.jpg 768w\" sizes=\"auto, (max-width: 906px) 100vw, 906px\" \/><\/p>\n<h3><span class=\"ez-toc-section\" id=\"What_is_Ransomware\"><\/span><b>What is Ransomware?<\/b><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">It is best described as malicious software that will block your access to files in the computer or laptop. In recent times, the threat of ransomware has increased all over the world. And it is quite alarming that many cases are not reported to the authorities because of fear of loss of name. Now let us focus on 10 most dangerous ransomware attacks in the last 10 years.<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"1Ransomware_WannaCry\"><\/span><b>1.Ransomware WannaCry<\/b><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">The year was 2017, and in the first half of the year, the ransomware first hit computers in the UK. It asked for payment in Bitcoins. The program exposed the vulnerabilities in Microsoft software. But true to its name, it bled many institutions and companies in the US and other countries. As per a business survey, many cases may not have got reported to the authorities.<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"2_Ransomware_NotPetya_2017\"><\/span><strong>2. Ransomware NotPetya (2017)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">It was the Ukraine and Netherlands which first got affected. Slowly this ransomware spread to Britain, Spain, entire Europe, and even the US. And even Ukraine\u2019s national bank got affected. This ransomware spread via a vulnerable segment in Microsoft software. It was a clone from the Petya ransomware, but the demand for ransom was low. The entire data on the hard disk got affected because of NotPetya.<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"3_Ransomware_Petya_2016\"><\/span><strong>3. Ransomware Petya (2016)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Other than Cryptowall, if there was another ransomware which caused loss of millions of dollars, it was Petya. This ransomware made the computer unusable till you pay the ransom.<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"4_Ransomware_LOcky_2016\"><\/span><strong>4. Ransomware LOcky (2016)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-794 aligncenter\" src=\"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2019\/04\/cybersecurity.jpg\" alt=\"\" width=\"647\" height=\"340\" srcset=\"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2019\/04\/cybersecurity.jpg 647w, https:\/\/www.techmagazines.net\/wp-content\/uploads\/2019\/04\/cybersecurity-300x158.jpg 300w\" sizes=\"auto, (max-width: 647px) 100vw, 647px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">It was the first time that a medical institution security system in the US got compromised because of this ransomware. The amount paid was 17,000 US dollars for the encryption key. The malware was spread in a relatively new type, where the victim had to download a Word Macro disguised as an invoice. If the user clicked the macro, then the malware got downloaded and encrypted the data, and demand ransom.<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"5_RansomwareCryptolocker\"><\/span><strong>5. RansomwareCryptolocker<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">When you just look back at the years of 2013 and 2014, you will find the name CryptoLocker stands high among the ransomware list. Unlike the olden times, this was the first time the creators earned money for designing ransomware. And the amount as per a survey was a cool three million in dollars.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">But the threat was still lingering on the internet. Clones appeared, most notably, by the names of TorrentLocker and Cryptowall. And as per records, maybe, the success of <a rel=\"nofollow\" href=\"https:\/\/usa.kaspersky.com\/resource-center\/definitions\/cryptolocker\"><strong>CryptoLocker<\/strong><\/a> made the ransomware designers think that they can target even value-added establishments such as banking and even Government sectors.<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"6_Ransomware_CryptoWall\"><\/span><span style=\"font-weight: 400;\"><strong>6. Ransomware CryptoWall<\/strong><br \/>\n<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Check the records between 2014 and 2016. It was Cryptowall which was the most famous clone of CryptoLocker. This ransomware targeted businesses and individual computers. As per a survey, nearly 18 million dollars passed on to the designers of this ransomware.<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"7_Ransomware_TeslaCrypt_2015\"><\/span><strong>7. Ransomware TeslaCrypt (2015)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">This ransomware was also a break from the Crytolocker. But this malware was different. It targeted files which were associated with video games, downloadable content and more. Since these files were precious to hardcore game enthusiasts, they were stored in the drive. The ransomware got continuously improved by the designers, so the restoration became totally impossible. But due to a change of heart, the designers suddenly stopped their activities and offered the key to the entire globe.<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"8_Ransomware_SimpleLocker_End_Months_of_2015\"><\/span><strong>8. Ransomware SimpleLocker (End Months of 2015)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">This was one among the ransomware which spread to android mobiles. Since everyone started preferring mobile rather than browsing on computers and laptops, the scammers also targeted mobiles. It was in the year 2015, that this ransomware spread. Without the encryption key, it was impossible to access files devoid of help from scammers.<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"9_Ransomware_TorrentLocker_2014\"><\/span><strong>9. Ransomware TorrentLocker (2014)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">This ransomware was also a part of CyptoLocker code, and it spread by email attachments. Similar to many ransomware, it spread through regular channels, such as email attachments or by giving links of downloadable files. The payment stated in the tune of 550 US dollars via Bitcoin. But the change was the price will increase after three days.<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"10_Ransomware_Reveton_2012\"><\/span><strong>10. Ransomware Reveton (2012)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">It was the year 2012, and the spreading was done with great precision. The Police Trojan, as was also called, came to the mail of unsuspecting victims stating unlicensed software is present in the system. Once opened, the system became blocked and it was only payment of fees via various channels that the files can get access.<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Ransomware_Archievus_2006\"><\/span><strong>Ransomware Archievus (2006)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">The ransomware first made its appearance as per the official records in 1998, but it was in 2006, that the first proper step to ransomware was written. The name of the ransomware was Archievus, and it targeted only Windows users. The My Documents folder was the first to get affected. And if a person got affected, he\/she was blackmailed to make purchases from various online sellers before getting the key for decryption. But, the password did not differ much from one victim to the other, and within some time, the term got published. Victims made use of the password to recover their data.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Lesser Known Ransomware<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-795 aligncenter\" src=\"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2019\/04\/cybercrime.jpg\" alt=\"\" width=\"510\" height=\"340\" srcset=\"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2019\/04\/cybercrime.jpg 510w, https:\/\/www.techmagazines.net\/wp-content\/uploads\/2019\/04\/cybercrime-300x200.jpg 300w\" sizes=\"auto, (max-width: 510px) 100vw, 510px\" \/><\/p>\n<h3><span class=\"ez-toc-section\" id=\"1Ransomware_Ryuk\"><\/span><strong>1.Ransomware Ryuk<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">It was in the month of 2018, that the attack started and it went by the name of Ryuk. This ransomware netted about 6 lakh dollars from the victims for the designers. It disabled the entire Windows System Restore option for the victims. And so you would have to pay the price for the encryption key.<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"2_Ransomware_GandCrab\"><\/span><span style=\"font-weight: 400;\"><strong>2. Ransomware GandCrab<\/strong><br \/>\n<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">This malware first made its appearance in Jan 2018. And the fee of ransom was nearly 500 pounds for the encryption key or return of files. As per a security firm, this ransomware was given as a service package to persons who desired to be hardcore ransomware professionals. Once they got the money, they have to share the profits with the designers in the range of 60 to 40.<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"3_UnKnown\"><\/span><span style=\"font-weight: 400;\">3. UnKnown<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">To be precise, the date was 26 July 2017. This ransomware attacked a medical center in the US. Although it did not affect the patient base of the computer, other documents such as image files (X-rays) got affected. And the other information such as future appointments became inaccessible.<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"4_Ransomware_Reyptson\"><\/span><strong>4. Ransomware Reyptson<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">The month was July 2017 and it was the month that the ransomware struck. It spread via email having a false invoice document.<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"5_Ransomware_LeakerLocker\"><\/span><strong>5. Ransomware LeakerLocker<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">This ransomware also made its appearance in the same month as the previously mentioned title. This malware locked the home screen and caused fear in the victim\u2019s minds by informing it has access to every email address, text messages, and calls. Unless the ransomware is paid, the data will get shared online.<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"6_Ransomware_WYSIWYE_April_2017\"><\/span><strong>6. Ransomware WYSIWYE (April 2017)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">The full form is What You See Is What You Encrypt. The procedure used was the Remote Desktop Protocol (RDP) brute force attack. In this method, the <a rel=\"nofollow\" href=\"https:\/\/www.forbes.com\/sites\/thomasbrewster\/2019\/02\/20\/mistaken-for-north-koreans-the-ryuk-ransomware-hackers-are-making-millions\/#63f64c4375f4\"><strong>ransomware hackers<\/strong><\/a> scan the entire web for the availability of open RDP servers. In case they find the availability, an online tool is used for trying many\u00a0<\/span><span style=\"font-weight: 400;\">password combinations to steal the credentials. And then the ransomware gets transferred to the target computer.<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"7_Ransomware_Osiris\"><\/span><strong>7. Ransomware Osiris<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">The date was 12 December 2016. And the victim was a law enforcement agency. The ransomware was received via a fake department address. This virus caused encryption of Microsoft Excel and Office documents along with videos and photographs. The demand was 4000 US dollars in Bitcoin.<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"8_Ransomware_Cerber\"><\/span><strong>8. Ransomware Cerber<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">It was in the time of 2016 to 2017 that this crypto-malware struck. Many of the Microsoft OS was affected by this ransomware. Similar to CryptoLocker, you can find various clones of Cerber on the internet.<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"9_Ransomware_BadRabbit_October_2017\"><\/span><strong>9. Ransomware BadRabbit (October 2017)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\"><a rel=\"nofollow\" href=\"https:\/\/www.theguardian.com\/technology\/2017\/dec\/30\/wannacry-petya-notpetya-ransomware\"><strong>Similar to NotPetya<\/strong><\/a> and WannaCry, this ransomware also made use of the Microsoft OS for targeting mainly Russian as well as Ukrainian organizations. But as per reports, countries such as some parts of the US, South Korea, and even Poland got affected. The threat was named as BadRabbit.<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span><strong>Conclusion<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">All said and done. Yes, you have gained enough information on ransomware, but the threat still lurks large over the horizon. Anytime, anywhere, a smart mind can unleash ransomware to the entire world. So it is necessary to have the best antivirus antispyware software in your system.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">And yes, there is one factor which assumes prominence. Maintenance service for your computer or laptop at least once a year. Let us imagine, you are in Mumbai, and have a computer or laptop at home, which the children use for games or project purposes. One day, they complain about the performance of the computer has gone slow. When you check, you find numerous unwanted programs running in the background. You delete some programs, make use of free antivirus software but still, there was no change. So, the situation calls for the assistance of the best computer repair engineer. And how will you get one? Download the app of the best company offering home appliance repair service in Mumbai. These companies will also have technicians skilled in <\/span><a href=\"https:\/\/bro4u.com\/computer-service-mumbai\"><b>computer repair service in Mumbai<\/b><\/a><span style=\"font-weight: 400;\"> on their payrolls. Check their app, select the best techie near your home and ask him to come to fix the system at your own time. Since these professionals are educated and highly qualified, you can trust them with your computer. And they can solve any problem with ease.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Have you read the article on the famous ransomware that created mayhem in the business world? Want to get more updates? Check our newsletter for more updates.<\/span><\/div>\n","protected":false},"excerpt":{"rendered":"<div class=\"wpm_excerpt clearfix\"><p><span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Reading Time: <\/span> <span class=\"rt-time\"> 7<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span>It was the time when the internet gained popularity. There was not much knowledge about malware and computer virus on the internet. So, everyone followed the &hellip;<\/p>\n<\/div>","protected":false},"author":5,"featured_media":798,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[37,2],"tags":[],"class_list":["post-792","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","category-tech-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>10 Most Dangerous Ransomware Attacks In The Last 10 Years | Tech Magazine<\/title>\n<meta name=\"description\" content=\"Read the informative blog about 10 Most Dangerous Ransomware Attacks In The Last 10 Years. In this blog we describe about Most Dangerous Ransomware Attacks In The Last 10 Years.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.techmagazines.net\/most-dangerous-ransomware-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"10 Most Dangerous Ransomware Attacks In The Last 10 Years | Tech Magazine\" \/>\n<meta property=\"og:description\" content=\"Read the informative blog about 10 Most Dangerous Ransomware Attacks In The Last 10 Years. In this blog we describe about Most Dangerous Ransomware Attacks In The Last 10 Years.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.techmagazines.net\/most-dangerous-ransomware-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Tech Magazine\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/profile.php?id=100007079021205&amp;ref=br_rs\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-04T15:26:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-04-04T15:30:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2019\/04\/cybersecurity_reviewInfra-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"482\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"sathyanarayana\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"sathyanarayana\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.techmagazines.net\/most-dangerous-ransomware-attacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.techmagazines.net\/most-dangerous-ransomware-attacks\/\"},\"author\":{\"name\":\"sathyanarayana\",\"@id\":\"https:\/\/www.techmagazines.net\/#\/schema\/person\/aa4d51cd155fbe4c43e26889e60e465c\"},\"headline\":\"10 Most Dangerous Ransomware Attacks In The Last 10 Years\",\"datePublished\":\"2019-04-04T15:26:04+00:00\",\"dateModified\":\"2019-04-04T15:30:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.techmagazines.net\/most-dangerous-ransomware-attacks\/\"},\"wordCount\":1628,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.techmagazines.net\/#\/schema\/person\/9827714c3556d6a5d325c9af0386dac2\"},\"image\":{\"@id\":\"https:\/\/www.techmagazines.net\/most-dangerous-ransomware-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2019\/04\/cybersecurity_reviewInfra-2.jpg\",\"articleSection\":[\"Cyber Security\",\"Tech News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.techmagazines.net\/most-dangerous-ransomware-attacks\/\",\"url\":\"https:\/\/www.techmagazines.net\/most-dangerous-ransomware-attacks\/\",\"name\":\"10 Most Dangerous Ransomware Attacks In The Last 10 Years | Tech Magazine\",\"isPartOf\":{\"@id\":\"https:\/\/www.techmagazines.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.techmagazines.net\/most-dangerous-ransomware-attacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.techmagazines.net\/most-dangerous-ransomware-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2019\/04\/cybersecurity_reviewInfra-2.jpg\",\"datePublished\":\"2019-04-04T15:26:04+00:00\",\"dateModified\":\"2019-04-04T15:30:26+00:00\",\"description\":\"Read the informative blog about 10 Most Dangerous Ransomware Attacks In The Last 10 Years. In this blog we describe about Most Dangerous Ransomware Attacks In The Last 10 Years.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.techmagazines.net\/most-dangerous-ransomware-attacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.techmagazines.net\/most-dangerous-ransomware-attacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techmagazines.net\/most-dangerous-ransomware-attacks\/#primaryimage\",\"url\":\"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2019\/04\/cybersecurity_reviewInfra-2.jpg\",\"contentUrl\":\"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2019\/04\/cybersecurity_reviewInfra-2.jpg\",\"width\":1000,\"height\":482},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.techmagazines.net\/most-dangerous-ransomware-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.techmagazines.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"10 Most Dangerous Ransomware Attacks In The Last 10 Years\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.techmagazines.net\/#website\",\"url\":\"https:\/\/www.techmagazines.net\/\",\"name\":\"Tech Magazines\",\"description\":\"Best Digital Tech Magazines Site\",\"publisher\":{\"@id\":\"https:\/\/www.techmagazines.net\/#\/schema\/person\/9827714c3556d6a5d325c9af0386dac2\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.techmagazines.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/www.techmagazines.net\/#\/schema\/person\/9827714c3556d6a5d325c9af0386dac2\",\"name\":\"Amit Gupta\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techmagazines.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2019\/03\/cropped-technologies-2.png\",\"contentUrl\":\"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2019\/03\/cropped-technologies-2.png\",\"width\":500,\"height\":125,\"caption\":\"Amit Gupta\"},\"logo\":{\"@id\":\"https:\/\/www.techmagazines.net\/#\/schema\/person\/image\/\"},\"description\":\"Amit Gupta is an experienced digital marketer, expert writer, and founder of Tech Magazine. With 5+ years in the industry, he specializes in creating in-depth content on Technology Updates, IoT, Gaming, Gadget, Web Development, and Artificial Intelligence. Connect on Facebook and Linkedin.\",\"sameAs\":[\"https:\/\/www.facebook.com\/profile.php?id=100007079021205&ref=br_rs\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.techmagazines.net\/#\/schema\/person\/aa4d51cd155fbe4c43e26889e60e465c\",\"name\":\"sathyanarayana\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techmagazines.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/90ff0be28adf4206090d5376244002e5ffb8cc11f23b42211ce3d0645bb04be2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/90ff0be28adf4206090d5376244002e5ffb8cc11f23b42211ce3d0645bb04be2?s=96&d=mm&r=g\",\"caption\":\"sathyanarayana\"},\"description\":\"Ranganath M is a distinguished photographer. Studied Masters in Finance, and is an expert at developing digital marketing strategies. At present, he is working as the Vice President of Promotions in the popular company offering services for washing machine repair in Bangalore, Bro4u. In fact, the company also offers repair services for other home electronic appliances. He was instrumental in the company opening branches in other cities, Pune, Mumbai and Hyderabad.\",\"url\":\"https:\/\/www.techmagazines.net\/author\/sathyanarayana\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"10 Most Dangerous Ransomware Attacks In The Last 10 Years | Tech Magazine","description":"Read the informative blog about 10 Most Dangerous Ransomware Attacks In The Last 10 Years. In this blog we describe about Most Dangerous Ransomware Attacks In The Last 10 Years.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.techmagazines.net\/most-dangerous-ransomware-attacks\/","og_locale":"en_US","og_type":"article","og_title":"10 Most Dangerous Ransomware Attacks In The Last 10 Years | Tech Magazine","og_description":"Read the informative blog about 10 Most Dangerous Ransomware Attacks In The Last 10 Years. In this blog we describe about Most Dangerous Ransomware Attacks In The Last 10 Years.","og_url":"https:\/\/www.techmagazines.net\/most-dangerous-ransomware-attacks\/","og_site_name":"Tech Magazine","article_publisher":"https:\/\/www.facebook.com\/profile.php?id=100007079021205&ref=br_rs","article_published_time":"2019-04-04T15:26:04+00:00","article_modified_time":"2019-04-04T15:30:26+00:00","og_image":[{"width":1000,"height":482,"url":"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2019\/04\/cybersecurity_reviewInfra-2.jpg","type":"image\/jpeg"}],"author":"sathyanarayana","twitter_card":"summary_large_image","twitter_misc":{"Written by":"sathyanarayana","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.techmagazines.net\/most-dangerous-ransomware-attacks\/#article","isPartOf":{"@id":"https:\/\/www.techmagazines.net\/most-dangerous-ransomware-attacks\/"},"author":{"name":"sathyanarayana","@id":"https:\/\/www.techmagazines.net\/#\/schema\/person\/aa4d51cd155fbe4c43e26889e60e465c"},"headline":"10 Most Dangerous Ransomware Attacks In The Last 10 Years","datePublished":"2019-04-04T15:26:04+00:00","dateModified":"2019-04-04T15:30:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.techmagazines.net\/most-dangerous-ransomware-attacks\/"},"wordCount":1628,"commentCount":0,"publisher":{"@id":"https:\/\/www.techmagazines.net\/#\/schema\/person\/9827714c3556d6a5d325c9af0386dac2"},"image":{"@id":"https:\/\/www.techmagazines.net\/most-dangerous-ransomware-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2019\/04\/cybersecurity_reviewInfra-2.jpg","articleSection":["Cyber Security","Tech News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.techmagazines.net\/most-dangerous-ransomware-attacks\/","url":"https:\/\/www.techmagazines.net\/most-dangerous-ransomware-attacks\/","name":"10 Most Dangerous Ransomware Attacks In The Last 10 Years | Tech Magazine","isPartOf":{"@id":"https:\/\/www.techmagazines.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.techmagazines.net\/most-dangerous-ransomware-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.techmagazines.net\/most-dangerous-ransomware-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2019\/04\/cybersecurity_reviewInfra-2.jpg","datePublished":"2019-04-04T15:26:04+00:00","dateModified":"2019-04-04T15:30:26+00:00","description":"Read the informative blog about 10 Most Dangerous Ransomware Attacks In The Last 10 Years. In this blog we describe about Most Dangerous Ransomware Attacks In The Last 10 Years.","breadcrumb":{"@id":"https:\/\/www.techmagazines.net\/most-dangerous-ransomware-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.techmagazines.net\/most-dangerous-ransomware-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techmagazines.net\/most-dangerous-ransomware-attacks\/#primaryimage","url":"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2019\/04\/cybersecurity_reviewInfra-2.jpg","contentUrl":"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2019\/04\/cybersecurity_reviewInfra-2.jpg","width":1000,"height":482},{"@type":"BreadcrumbList","@id":"https:\/\/www.techmagazines.net\/most-dangerous-ransomware-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.techmagazines.net\/"},{"@type":"ListItem","position":2,"name":"10 Most Dangerous Ransomware Attacks In The Last 10 Years"}]},{"@type":"WebSite","@id":"https:\/\/www.techmagazines.net\/#website","url":"https:\/\/www.techmagazines.net\/","name":"Tech Magazines","description":"Best Digital Tech Magazines Site","publisher":{"@id":"https:\/\/www.techmagazines.net\/#\/schema\/person\/9827714c3556d6a5d325c9af0386dac2"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.techmagazines.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/www.techmagazines.net\/#\/schema\/person\/9827714c3556d6a5d325c9af0386dac2","name":"Amit Gupta","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techmagazines.net\/#\/schema\/person\/image\/","url":"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2019\/03\/cropped-technologies-2.png","contentUrl":"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2019\/03\/cropped-technologies-2.png","width":500,"height":125,"caption":"Amit Gupta"},"logo":{"@id":"https:\/\/www.techmagazines.net\/#\/schema\/person\/image\/"},"description":"Amit Gupta is an experienced digital marketer, expert writer, and founder of Tech Magazine. With 5+ years in the industry, he specializes in creating in-depth content on Technology Updates, IoT, Gaming, Gadget, Web Development, and Artificial Intelligence. Connect on Facebook and Linkedin.","sameAs":["https:\/\/www.facebook.com\/profile.php?id=100007079021205&ref=br_rs"]},{"@type":"Person","@id":"https:\/\/www.techmagazines.net\/#\/schema\/person\/aa4d51cd155fbe4c43e26889e60e465c","name":"sathyanarayana","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techmagazines.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/90ff0be28adf4206090d5376244002e5ffb8cc11f23b42211ce3d0645bb04be2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/90ff0be28adf4206090d5376244002e5ffb8cc11f23b42211ce3d0645bb04be2?s=96&d=mm&r=g","caption":"sathyanarayana"},"description":"Ranganath M is a distinguished photographer. Studied Masters in Finance, and is an expert at developing digital marketing strategies. At present, he is working as the Vice President of Promotions in the popular company offering services for washing machine repair in Bangalore, Bro4u. In fact, the company also offers repair services for other home electronic appliances. He was instrumental in the company opening branches in other cities, Pune, Mumbai and Hyderabad.","url":"https:\/\/www.techmagazines.net\/author\/sathyanarayana\/"}]}},"_links":{"self":[{"href":"https:\/\/www.techmagazines.net\/wp-json\/wp\/v2\/posts\/792","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.techmagazines.net\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.techmagazines.net\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.techmagazines.net\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techmagazines.net\/wp-json\/wp\/v2\/comments?post=792"}],"version-history":[{"count":0,"href":"https:\/\/www.techmagazines.net\/wp-json\/wp\/v2\/posts\/792\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.techmagazines.net\/wp-json\/wp\/v2\/media\/798"}],"wp:attachment":[{"href":"https:\/\/www.techmagazines.net\/wp-json\/wp\/v2\/media?parent=792"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.techmagazines.net\/wp-json\/wp\/v2\/categories?post=792"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.techmagazines.net\/wp-json\/wp\/v2\/tags?post=792"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}