262:
172:
70:
403:
87:
121:
65:
60:
36:
306:
104:
384:
360:
413:
301:
160:
321:
284:
194:
99:
348:
206:
82:
408:
326:
126:
331:
182:
177:
116:
223:
17:
279:
397:
274:
235:
372:
136:
250:
343:
311:
48:
22:
289:
218:
131:
240:
148:
316:
245:
35:
The following 43 pages are in this category, out of 43 total.
263:Munster Technological University ransomware attack
8:
173:Health Service Executive ransomware attack
71:2024 cyberattack on Kadokawa and Niconico
37:This list may not reflect recent changes
7:
88:Atlanta government ransomware attack
122:Colonial Pipeline ransomware attack
66:2022 Costa Rican ransomware attack
41:
29:
14:
61:2019 Baltimore ransomware attack
32:Pages in category "Ransomware"
1:
404:Applications of cryptography
307:The Ransomware Hunting Team
105:British Library cyberattack
430:
385:WannaCry ransomware attack
361:U.S. Ransomware Task Force
16:The main article for this
15:
302:Ransomware as a service
161:FBI MoneyPak Ransomware
322:Rhysida (hacker group)
285:Petya (malware family)
195:Initial access broker
100:BlackCat (cyber gang)
349:Thanos (ransomware)
207:Jigsaw (ransomware)
83:AIDS (Trojan horse)
327:Royal (cyber gang)
127:Conti (ransomware)
332:Ryuk (ransomware)
183:Hive (ransomware)
178:Hitler-Ransomware
117:Clop (cyber gang)
421:
429:
428:
424:
423:
422:
420:
419:
418:
414:Malware by type
394:
393:
392:
391:
390:
389:
377:
365:
353:
336:
294:
267:
255:
228:
224:Kirk Ransomware
211:
199:
187:
165:
153:
141:
109:
92:
75:
53:
28:
27:
12:
11:
5:
427:
425:
417:
416:
411:
406:
396:
395:
388:
387:
381:
378:
376:
375:
369:
366:
364:
363:
357:
354:
352:
351:
346:
340:
337:
335:
334:
329:
324:
319:
314:
309:
304:
298:
295:
293:
292:
287:
282:
277:
271:
268:
266:
265:
259:
256:
254:
253:
248:
243:
238:
232:
229:
227:
226:
221:
215:
212:
210:
209:
203:
200:
198:
197:
191:
188:
186:
185:
180:
175:
169:
166:
164:
163:
157:
154:
152:
151:
145:
142:
140:
139:
134:
129:
124:
119:
113:
110:
108:
107:
102:
96:
93:
91:
90:
85:
79:
76:
74:
73:
68:
63:
57:
54:
52:
51:
45:
43:
42:
33:
30:
13:
10:
9:
6:
4:
3:
2:
426:
415:
412:
410:
407:
405:
402:
401:
399:
386:
383:
382:
379:
374:
371:
370:
367:
362:
359:
358:
355:
350:
347:
345:
342:
341:
338:
333:
330:
328:
325:
323:
320:
318:
315:
313:
310:
308:
305:
303:
300:
299:
296:
291:
288:
286:
283:
281:
278:
276:
275:Park Jin Hyok
273:
272:
269:
264:
261:
260:
257:
252:
249:
247:
244:
242:
239:
237:
236:Linux.Encoder
234:
233:
230:
225:
222:
220:
217:
216:
213:
208:
205:
204:
201:
196:
193:
192:
189:
184:
181:
179:
176:
174:
171:
170:
167:
162:
159:
158:
155:
150:
147:
146:
143:
138:
135:
133:
130:
128:
125:
123:
120:
118:
115:
114:
111:
106:
103:
101:
98:
97:
94:
89:
86:
84:
81:
80:
77:
72:
69:
67:
64:
62:
59:
58:
55:
50:
47:
46:
44:
40:
38:
31:
25:
24:
19:
373:Vice Society
280:Denis Periša
137:CryptoLocker
34:
21:
251:LogicLocker
398:Categories
344:TeslaCrypt
312:Rensenware
49:Ransomware
23:Ransomware
409:Extortion
290:PGPCoder
219:KeRanger
132:CryptMix
18:category
241:LockBit
149:Dridex
317:REvil
246:Locky
56:0–9
20:is
400::
39:.
380:W
368:V
356:U
339:T
297:R
270:P
258:M
231:L
214:K
202:J
190:I
168:H
156:F
144:D
112:C
95:B
78:A
26:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.