A report from New Zealand-headquartered security vendor Emsisoft said last year was another lucrative for those using ransomware to make money, with many COVID-themed attacks trying to take advantage of the public interest in the pandemic.
The report said 506,185 ransomware submissions - estimated to be only a quarter of the total attacks - were made to the company and the ID Ransomware service, the latter created by its researcher, Michael Gillespie. It enables people to find out which ransomware has hit them and also suggests a free decryptor if one is available.
The most common strain of ransomware reported during the year was STOP/Djvu which accounted for a shade more than 70% of submissions. STOP is claimed to have more than 160 confirmed variants.
- STOP (Djvu): 71.20%
- Phobos: 8.90%
- Dharma (.cezar Family): 7.90%
- REvil / Sodinokibi: 3.40%
- LockBit: 1.90%
- GlobeImposter 2.0: 1.70%
- Magniber: 1.70%
- Makop: 1.30%
- Avaddon: 1.10%
- Zeppelin: 1.00%
Among countries, India reported the most submissions, with 27.4%. Australia did not figure in the top 10. The highest number of submissions was made in April.
Emsisoft's data indicated that Asia was the most commonly targeted region.