Contact us today!

FRS Pros Blog

Let’s Look at the Different Types of Ransomware

Let’s Look at the Different Types of Ransomware

The growing popularity of ransomware has been disconcerting to many IT professionals, particularly due to the different tactics that this malware variant has been spotted utilizing. In order to protect your business from these attacks, it helps to know how they work. We’ve put together a beginner’s field guide to ransomware types to help you identify (and hopefully avoid) it.

Crypto Ransomware

Crypto ransomware works via a particularly insidious approach: it encrypts each of your files individually, ensuring that your access is completely blocked. Then, as any ransomware would, it starts a timer that counts down to when all of these files are set to be deleted. When someone is targeted by crypto ransomware, the only real option is to completely wipe the system and restore from a backup. We will never recommend that someone pays a ransomware demand, as there is no guarantee that even paying it will result in the return of your files. This is part of the reason that we always encourage businesses to keep a backup in the cloud.


AKA “doxware,” extortionware operates similarly to how crypto ransomware does. Files are encrypted and payment is demanded, and the same general concepts bleed over. The big difference is that extortionware threatens to leak the encrypted data, rather than delete it. While the leverage this gives the attacker is pretty much the opposite kind than that of crypto ransomware, it has proven to be just as effective in convincing the target to pay up.

Locker Ransomware

This ransomware seals off access to the user’s entire system, doing nothing to the files themselves but rendering a device essentially useless, save for the capability to pay said ransomware’s demands. This makes it very similar to crypto ransomware, just without the threat of deletion.


Scareware is named primarily due to the tactics it uses to infiltrate its victims’ systems. Disguised as some kind of antivirus or other security program, scareware falsely alerts the target to issues present on the device and offers to resolve it for a fee. While not everyone feels that this technically classifies as ransomware, the undeniable similarity in their methods certainly links the two terms together.

What You Can Do About It:

Protecting your business from ransomware really boils down to a few key best practices:

  • Educate your entire staff: Your team needs to know what to keep an eye out for to spot ransomware preemptively, and how to approach it in order to keep it from successfully taking root. 
  • Keep a backup: If ransomware does manage to encrypt your documents, you will want a backup ready to restore from.
  • Update your software: Ransomware takes advantage of unpatched exploits in order to successfully infiltrate a system. Applying patches and otherwise updating your system can eliminate a lot of these weak points.

An exploitative issue like ransomware will stoop to really low levels to carry out its mission. For instance, one in particular has been spotted and coined as CovidLock, as it capitalizes upon a malicious coronavirus tracking application installed on Android devices. However, you can have a reliable resource in your corner to help your business defend itself.

FRS Pros is ready to be that resource and reinforce your cybersecurity and attend to your other IT needs. Learn more by reading some of our other blogs and the other content on our website, or by talking to us at 561-795-2000.

Coronavirus is Shifting the Communications Industr...
Tip of the Week: Getting More Mileage Out of PDFs

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Technology Best Practices Productivity Network Security Business Computing Privacy Internet User Tips Hackers Software Google Cloud Microsoft Hardware Innovation Efficiency Computer Business Management Data Email Windows 10 Hosted Solutions Communication Smartphones Tech Term Cybersecurity Data Backup IT Support Malware Mobile Devices IT Services Business Small Business Disaster Recovery Upgrade Smartphone Android Data Recovery Office 365 Backup Outsourced IT Workplace Tips Browser VoIP Internet of Things Gadgets Windows Apps Users Communications Cloud Computing Collaboration Business Continuity Phishing Data Security Network Cybercrime Saving Money Ransomware Managed IT Services Information Automation Miscellaneous Operating System Facebook Managed Service Mobile Device Management Microsoft Office Artificial Intelligence Alert OneNote Passwords Law Enforcement Social Media Server Employer-Employee Relationship Health Blockchain Two-factor Authentication Vulnerability Money Managed IT Services Networking Virtualization IT Support Managed IT Applications Quick Tips Wireless Best Practice Spam Chrome Mobile Office Holiday Data Storage Retail Hacking Information Technology Gmail Windows 10 Mobile Device Save Money Conferencing Windows 7 Word Computers Project Management Patch Management Managed Service Provider Bandwidth Data Breach BYOD Router Unsupported Software Augmented Reality Telephone Systems App Google Drive Settings Tech Support Access Control Printing Bring Your Own Device Password Hybrid Cloud Touchscreen Risk Management Going Green Social WiFi Remote Workers Cortana Voice over Internet Protocol Government Data Loss Wi-Fi Robot Business Technology Audit Update The Internet of Things Google Docs Shortcut Software as a Service Data Protection Wireless Charging Politics Meetings Devices Budget Hard Drive Display VPN iPhone Human Resources Wireless Technology BDR Data Management IT Management History Cost Management Payment Cards Marketing Commerce Productivity WannaCry Travel Sports File Sharing Application Paperless Office Hosted Solution Excel Fraud Encryption Avoiding Downtime Mobility Search Safety Mobile Security Telephony SaaS Vendor Proactive IT Evernote User Error Google Assistant Emergency Machine Learning Touchpad Fiber Optics Websites Identity Printers Development Uninterrupted Power Supply NFL eWaste Saving Time Identities Point of Sale Employee-Employer Relationship iOS WIndows Server 2008 Server Maintenance Remote Work Wireless Internet Benchmarks Ciminal Keyboard Medical IT Windows 10s HBO Smart Devices Charger Entertainment Value Wasting Time Amazon Downtime Screen Mirroring Humor Holidays Data Theft Identity Theft Data Privacy Computer Care Nanotechnology Micrsosoft Device Security Gamification Keyboard Shortcuts Unified Threat Management Managed IT Service Files Legislation Language Office Investment Net Neutrality DDoS Adobe Workers Myths Disaster 5G Solid State Drive Sabotage Troubleshooting Recovery Personal Information Accessory Virtual Assistant E-Commerce Emails Cast Copiers Gifts Computing Vendor Management Root Cause Analysis Business Intelligence Windows Ink Memory Upgrades Managed Services Provider Comparison Scam Testing Computer Fan ROI Reputation Internet Service Provider Licensing Updates Data storage Threats Microsoft Excel IT budget Education YouTube Hard Disk Drive PC CRM Administrator Outlook Computer Forensics Peripheral Google Maps Spyware Alexa for Business Inventory Streaming Media Credit Cards App store Samsung Chromebook Co-Managed Services Remote Computing Digital Signage Lithium-ion battery Financial Payroll Facebook Privacy Specifications Virus Camera Windows Server 2008 R2 Microsoft Word Scams Employees IT Solutions AI Access Legal Management Apple Employee Webinar Chromecast Antivirus Telephone Firewall Security Cameras Consultant Laptop eCommerce Sales Proactive Projects Transportation Tablets Maintenance Remote Monitoring Virtual Private Network Storage Social Engineering Battery OneDrive Smartwatch Private Cloud HIPAA Internet Exlporer Sync PowerPoint Admin Edge Instant Messaging Hacker Break/Fix IT solutions Hosted Desktop FAQ Hyperlink Processor Company Culture Scalability Analytics End of Support Regulation HaaS Black Market Cleaning Relocation Automobile Big Data Managing Stress Twitter USB Worker PDF How To Books Hiring/Firing Mobile Computing Video Games Experience Virtual Reality Work/Life Balance Text Messaging Crowdsourcing Employer Employee Relationship Thank You Current Events Electronic Medical Records Cache Benefits es Phone System Save Time Communitications Office tips Computer Accessories Training Monitors Congratulations Advertising Smart Technology Flexibility Music Compliance Television CrashOverride