Bromium released a report analyzing Crypto-Ransomware. Crypto-Ransomware uses strong encryption to lock files on a victim’s computer until the ransom is payed. This report includes analysis of several versions of malware including CryptoLocker, Cryptowall/Cryptodefense, and TorrentLocker. It also includes the most common files encrypted by this malware and methods of payments/cost of the ransom.
- CryptoLocker: Surviving a Ransomware Attack CSIAC Webinar
- LeakerLocker: Mobile Ransomware Acts Without Encryption Digest Article
- Explained: Sage Ransomware Digest Article
- Ransomware Local Government Management Guide Reference Document
- The ICIT Ransomware Report Reference Document