Ransomware is malicious software that can infiltrate computer systems, networks, or servers, encrypting or altering data within them into a secret code.
This allows ransomware attackers to "hostage" the data of individuals, organizations, companies, and even government agencies. They often demand a ransom for the data to be accessed by its owner again.
According to the Indonesian National Cyber and Crypto Agency (BSSN), throughout 2023, approximately 1 million ransomware attack attempts or activities were detected in Indonesia's cyberspace.
The majority were Luna Moth, WannaCry, Locky, LockBit, and GandCrab ransomware, with the number of activities as shown in the graph.
Here are brief profiles of the 5 types of ransomware most commonly found in Indonesia in 2023, according to BSSN:
1. Luna Moth
Luna Moth typically steals company data using bait such as fake invoice emails. If clicked, it can infiltrate the victim's device.
The stolen sensitive data is then used to extort the victim and demand a large ransom.
2. WannaCry
WannaCry operates by encrypting data on devices with Windows operating systems, then demanding a ransom in Bitcoin.
3. Locky
Locky is ransomware spread via email, aiming to infiltrate computers, encrypt data, and demand a ransom in Bitcoin.
After encryption, the victim is directed to a website for ransom payment.
4. LockBit
Similar to WannaCry and Locky, LockBit generally holds the victim's data hostage and demands a ransom in Bitcoin.
LockBit is spread via email, fake links, or directly attacks devices with outdated operating systems. If the victim does not pay the ransom, the victim's data will be published or deleted.
5. GandCrab
GandCrab targets Windows users with distribution methods via email, fake links, or directly attacking devices with outdated operating systems.
If the ransom is not paid within a certain time, the victim's data will be deleted.