Cyber ransom and extortion, is a growing trend in context of overall cyber attacks. According to Check Point’s Global Threat Intelligence Trends Report, ransom attacks increased from 5% to over 10% of all malware attacks during the second half of 2016.
Hackers use ransom malware to take over a system and hold it hostage. They demand payment, and threaten to delete or share your information publicly. Typically, the cost is low enough to make it more effective to simply pay the ransom in lieu of losing valuable or sensitive data, paying fines, or risking reputational damage.
In its report, Check Point identifies the most common types of ransom malware as Conficker, Sality, Cutwail, JBossJMX and Locky. In addition, the most common type of mobile malware is Hummingbad, which accounted for 60% of all attacks on Android phones or devices.
The main source of ransom attacks begin with spam and target phishing emails.
For more information, please see: Roi Perez "Check Point: Ransomware % of malware doubled in second half of 2016." www.checkpoint.com
(Feb. 21, 2017).