2019-04-05 11:13:21 +02:00
{
"namespace" : "ransomware" ,
"expanded" : "ransomware types and elements" ,
"description" : "Ransomware is used to define ransomware types and the elements that compose them." ,
"version" : 1 ,
2019-04-05 11:26:29 +02:00
"refs" : [
"https://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/the-evolution-of-ransomware.pdf"
] ,
2019-04-05 11:13:21 +02:00
"predicates" : [
{
"value" : "type" ,
"expanded" : "Type" ,
"description" : "Type is used to describe the type of a ransomware and how it works."
} ,
{
"value" : "element" ,
"expanded" : "Element" ,
"description" : "Elements that composed or are linked to a ransomware and its execution."
}
] ,
"values" : [
{
"predicate" : "type" ,
"entry" : [
{
"value" : "scareware" ,
2019-04-05 11:26:29 +02:00
"expanded" : "Scareware is a form of malware which uses social engineering to cause shock, anxiety, or the perception of a threat in order to manipulate users into buying unwanted software."
2019-04-05 11:13:21 +02:00
} ,
{
2019-04-05 11:26:29 +02:00
"value" : "locker-ransomware" ,
"expanded" : "Locker eansomware, also called computer locker, denies access to the computer or device "
2019-04-05 11:13:21 +02:00
} ,
{
2019-04-05 11:26:29 +02:00
"value" : "crypto-ransomware" ,
"expanded" : "Crypto ransomware, also called data locker prevents access to files or data. Crypto ransomware doesn’ t necessarily have to use encryption to stop users from accessing their data, but the vast majority of it does."
2019-04-05 11:13:21 +02:00
}
] ,
} ,
{
"predicate" : "type" ,
"entry" : [
{
"value" : "ransomnote" ,
"expanded" : ""
} ,
{
"value" : "decoy" ,
"expanded" : ""
} ,
{
"value" : "crypter" ,
"expanded" : ""
} ,
{
"value" : "downloader" ,
"expanded" : ""
}
]
}
]
}