The earlier post, Understanding the World of Ransomware, described the techniques used in ransomware attacks as well as strategies for mitigating and preventing them. We shall study the development of attacks involving ransomware in this article. Since its inception, ransomware has experienced enormous evolution, and the simpler varieties that we now encounter are very different from the more complex ones. The ransom demand associated to each ransomware is shown in this table along with the ransomware's name, brief description, and affiliated attack.