Ransomware File Extensions

Ransomware extensions are special file suffixes added to encrypted files. Think of them as a hacker’s calling card which is a clear proof that your files have been hijacked.

TotalAv Logo

Stay malware-free with reliable antivirus

Don't compromise your Data and Privacy. TotalAV is a top-notch antivirus program that handles various viruses, trojans, and other malware that may target your devices. It will safeguard your devices and enhance your system performance.

4.9/5

Editor's Choice

✔️ Excellent Malware Detection
✔️ Multiple set of Features
✔️ 30 Day Money-Back

Get TotalAV >

These extensions serve several purposes: they alert victims that their files are no longer usable, create fear and urgency, and prevent standard software from opening the affected files.

By clearly labeling what’s been encrypted, they constantly remind victims of what’s at stake – unless they pay the ransom.

Here are some of the most common ransomware file extensions:

File ExtensionRansomware Name(s)Description
.wannacryWannaCryKnown for its rapid global spread and impact on various sectors.
.lockyLockyFamous for aggressive encryption.
.cryptolockerCryptoLockerOne of the earliest and most well-known ransomware types.
.petyaPetyaEncrypts entire disk partitions.
.badrabbitBad RabbitKnown for targeted attacks.
.notpetya / .nopetyaNotPetyaA more virulent variant of Petya.
.ryukRyukTargets large organizations, demands crypto ransoms.
.djvuSTOP/DjvuActively encrypts personal files.
.phobosPhobosKnown for fast encryption, also uses .deimos and .epic.
.dharmaDharma/CrySiSUses various extensions; spreads via RDP and email.
.contContiSuccessor of Ryuk, targets health/government.
.nephilimNephilimTargets sensitive sectors.
.avaddonAvaddonSpread via phishing, DDoS threats.
.makopMakopCustom encryption; claims false data theft.
.ransomexxRansomExx (Defray777)Targets high-profile entities.
.egregorEgregorTargets corporations, uses custom ransom notes.
.hellokittyHelloKittyTargets individuals and corporate networks.
.ABYSSAbyssCorporate-focused ransomware.
.akiraAkiraDemands large ransoms.
Random 8-charAlphaUses “MYDATA” DLS for leaks.
.avdnAvaddonSame as above, alternate extension.
HELLO/HELP+numbersBlack TurtleOccasionally affects individuals.
.blackcatBlackCatTargets infrastructure.
.blackmatterBlackMatterHigh-profile, shut down in 2021.
.hydraBlackSuitDemands large ransoms.
.newbotBO TeamTargets large entities.
.clopClopSophisticated exploits.
.contiContiDuplicate of .cont (merged above).
.ELCTRONICElectronicAppends ID and email to filenames.
.elibeElibeDiscovered via VirusTotal.
.cryptGlobeImposter 2.0Uses JavaScript, pirated sites.
.haronHaronSpin-off from Avaddon.
.hiveHiveTargets vulnerable healthcare systems.
.lethalLethal LockUses registry for persistence.
.lockbitLockbitIncentivizes insider attacks.
.matrixMatrixRDP-based access.
.MEOWMeowTargets misconfigured databases.
.newlive.teamNew Live TeamDemands Bitcoin.
.laloNew RanBusiness-focused.
.nightcrowNight CrowPublic sector target.
(none given)NoNameTargets NATO-aligned countries.
.pingPingTargets multimedia and data files.
.quantumQuantumFast encryption, phishing-based.
.schrodingercatSchrodingercatCorporate target, unique extension format.
.snetSNetSpread via spam and cracked software.
.revilSodinokibi (REvil)Highly widespread.
.tprcTprcDual payload (encryption + data theft).
.unknoUnknoGovernment and education targets.
.xamXamRansomware-as-a-Service (RaaS).
  11 Best Anti-Ransomware Software

Identifying the file extension used by ransomware can help determine its type or family, allowing you to take the right steps for removal and recovery.

Leave a Comment