Your internet search and browsing history can be seen by search engines, web browsers, websites, apps and hackers. You should protect your search and browsing history
While both locker and crypto ransomware are types of ransomware, there is one key difference between the two. The main difference between locker and crypto ransomware is that locker ransomware locks an entire device whereas crypto ransomware only encrypts files and data stored on the infected device.
Keep reading to learn more about locker and crypto ransomware and how your organization can prevent these and other ransomware attacks.
What is locker ransomware?
Locker ransomware is a type of ransomware that targets the victim’s device. Locker ransomware makes the victim’s device inoperable by preventing them from using their mouse or keyboard. The only thing the victim is able to do on their device is pay the specified ransom, which is also the only thing that will be displayed on the device’s screen.
Locker ransomware examples
Here are two locker ransomware examples.
WannaCry
WannaCry ransomware was designed to exploit a security vulnerability present in Windows Operating Systems (OS). In 2017, WannaCry affected 230,000 computers worldwide and effectively locked users out of systems. To regain access, a ransom payment of Bitcoin was demanded. This ransomware attack caused worldwide financial damage of approximately 4 billion dollars.
Reveton Worm
Reveton worm is ransomware that was first seen in Europe in 2012 but continues to evolve. This type of ransomware locks victims out of their OS and displays a screen that appears to be law enforcement in an attempt to scare victims by claiming they’ve committed a crime (e.g. downloading pirated software). Reveton worm is known to take over victims’ webcams to scare them into believing they’re being recorded by law enforcement.
What is crypto ransomware?
Crypto ransomware is the most common type of ransomware used by cybercriminals. When crypto ransomware is installed on a victim’s device, it encrypts the files and data stored on it. When these files are encrypted, the contents of them become scrambled, making them unreadable. Once encrypted, an on-screen alert will appear letting the victim know that the only way to decrypt their files is with the decryption key and that the only way for the victim to obtain the decryption key is by paying a specified ransom.
Crypto ransomware examples
Here are two crypto ransomware examples.
Petya
Petya ransomware was first identified in 2016 and was used to specifically target Windows computers. Petya locks up a computer’s entire hard drive by encrypting its Master File Table (MFT). This makes it impossible for the victim to access any files stored on the hard drive.
Locky
Locky ransomware was first discovered in 2016 by a group of hackers. Locky was used to encrypt more than 160 file types and is spread through the use of phishing emails that contain infected attachments.
The key difference between locker and crypto ransomware
There is only one key difference between locker and crypto ransomware and it has to do with what it prevents the victim from accessing. While locker ransomware locks an entire device, crypto ransomware only encrypts the stored data and files on the infected device. When crypto ransomware infects a device, victims can still use their device, they just won’t be able to access their stored files and data. This differentiates from locker ransomware which completely locks victims out of their device and prevents them from using it entirely.
How to prevent locker and crypto ransomware attacks
Here’s how your organization can prevent ransomware attacks.
Keep software up to date
Software updates are extremely important to prevent all types of malware, including ransomware. Malware often takes advantage of software vulnerabilities, so failing to update software as soon as a new update is available makes it easy for cybercriminals to infect devices. Encourage employees to update their software regularly. If needed, invest in a solution for your organization that enforces regular software updates on every employee’s device.
Teach employees how to spot phishing attempts
Many ransomware payloads are delivered through phishing emails, so training employees on how to spot phishing attempts can prevent them from falling victim. One of the best ways to train employees to spot phishing is by sending them simulated phishing tests. These tests can be used to determine how well employees can spot phishing. If employees are struggling, more training can be provided to strengthen their abilities in being able to spot phishing.
Invest in a business password manager
Some ransomware payloads are delivered after a cybercriminal has already breached a system using a weak or compromised password. Investing in a business password manager can help prevent ransomware caused by weak passwords by helping employees create strong passwords for every account and securely storing those passwords in an encrypted vault. Apart from helping with password creation and storage, password managers also help employees securely share passwords so they’re not at risk of compromise when being shared with coworkers or third parties.
Stay protected against all types of ransomware
Your organization must implement solutions and security measures to ensure ransomware can’t easily target its systems, which includes investing in a password manager like Keeper®.
Ready to protect your organization against ransomware attacks? Start a free 14-day business trial of Keeper today.