Inside Different Generations of Ransomware


Introduction

This page serves as the central hub for my series “Inside Different Generations of Ransomware”.

Unlike completed analysis articles, this page focuses on outlining the research scope, methodology, and planned targets for future analysis.

This page will be continuously updated as new research is added.

Research Scope

This series aims to analyze representative ransomware samples across different stages of evolution. The goal is not only to understand how they work, but also to identify how design patterns change over time.

The analysis will focus on:

  • Encryption mechanisms and key management
  • Propagation techniques (if applicable)
  • Anti-analysis and evasion techniques
  • Operational design (e.g., monetization strategies)

Evolution Overview

Based on existing reports and preliminary observations, ransomware appears to have evolved through several stages:

  • Early stage: Screen lockers with limited technical sophistication
  • Crypto ransomware era: Adoption of strong encryption mechanisms
  • Worm-enabled ransomware: Self-propagating attacks (e.g., WannaCry)
  • Modern ransomware: RaaS ecosystems and data exfiltration

These hypotheses will be further validated through detailed analysis in this series.

Roadmap

Planned analysis in this series includes:

  • CryptoLocker
  • WannaCry
  • Petya

Articles

The table below lists all articles in this series analyzing various ransomware families and variants.
It will be updated continuously as new research is published.

Ransomware Article
Preface of this series Inside Different Generations of Ransomware
Thought of Ransomware and RATs Ransomware vs. RAT

THANKS FOR READING