Threats & AttacksCritical

Ransomware

Malicious software that encrypts files or systems and demands payment for decryption keys

Skill Paths:
Malware AnalysisIncident ResponseThreat IntelligenceDigital Forensics
Job Paths:
Malware AnalystIncident ResponderThreat Intelligence AnalystSecurity Analyst
Relevant Certifications:
GIAC GREMSANS FOR508CEHCompTIA Security+
Content

What is Ransomware?

Ransomware is a type of malicious software that encrypts files, systems, or entire networks and demands payment (ransom) in exchange for decryption keys. It's one of the most financially damaging cyber threats, affecting individuals, businesses, and critical infrastructure.

How Ransomware Works

Infection Phase

  • Delivery – Phishing emails, exploit kits, compromised websites
  • Execution – Malicious code runs and begins encryption
  • Persistence – Establishes foothold in the system

Encryption Phase

  • File scanning – Identifies target files and systems
  • Encryption – Uses strong algorithms to encrypt data
  • Key generation – Creates unique encryption keys

Extortion Phase

  • Ransom note – Displays payment instructions
  • Payment demand – Usually cryptocurrency (Bitcoin, Monero)
  • Deadline – Threatens permanent data loss

Types of Ransomware

File-Encrypting Ransomware

  • CryptoLocker – Early widespread ransomware
  • WannaCry – Exploited EternalBlue vulnerability
  • Ryuk – Targeted enterprise networks
  • REvil/Sodinokibi – Ransomware-as-a-Service

System-Locking Ransomware

  • Screen lockers – Prevents system access
  • MBR lockers – Encrypts master boot record
  • Mobile ransomware – Targets smartphones and tablets

Double Extortion

  • Data theft – Steals data before encryption
  • Threat to publish – Demands payment to prevent data exposure
  • Multiple demands – Separate ransoms for decryption and silence

Prevention Strategies

Technical Controls

  • Regular backups – Air-gapped, immutable backups
  • Email filtering – Advanced threat protection
  • Endpoint protection – EDR/XDR solutions
  • Network segmentation – Isolate critical systems
  • Patch management – Keep systems updated

Organizational Measures

  • Security awareness training – Phishing simulation
  • Incident response planning – Ransomware playbooks
  • Business continuity – Recovery procedures
  • Cyber insurance – Financial protection

Response and Recovery

Immediate Actions

  • Isolate affected systems – Prevent spread
  • Assess scope – Identify all compromised systems
  • Preserve evidence – For forensic analysis
  • Notify authorities – Law enforcement reporting

Recovery Options

  • Restore from backups – Clean, recent backups
  • Decryption tools – Free tools from security vendors
  • Professional services – Incident response teams
  • Data reconstruction – Rebuild from other sources

Best Practices

  • Never pay the ransom – Encourages more attacks
  • Maintain offline backups – Air-gapped storage
  • Test recovery procedures – Regular backup testing
  • Implement zero trust – Verify all access
  • Monitor for indicators – Early detection systems
Quick Facts
Severity Level
10/10
Goal

Extort money through data encryption

Delivery

Phishing, exploit kits, RDP attacks

Payment

Usually cryptocurrency (Bitcoin, Monero)

Recovery

Backups, decryption tools, incident response