How it typically works?
- Initial infection: attackers gain entry through phishing, remote desktop compromise, or unpatched vulnerabilities.
- Privilege escalation: once inside, the malware attempts to gain administrative rights.
- Encryption: files and systems are encrypted using strong algorithms.
- Ransom demand: a note is displayed demanding cryptocurrency payment in exchange for a decryption key.
Common techniques & variants
- Crypto ransomware: encrypts files on endpoints and servers. Examples include WannaCry and LockBit.
- Locker ransomware: locks the entire system and prevents user access.
- Double extortion ransomware: steals data before encryption and threatens to leak it if payment is not made. Groups like Conti popularized this approach.
- Ransomware-as-a-Service (RaaS): criminal groups rent out ransomware tools. REvil and DarkSide are prominent cases.
- Destructive ransomware: masquerades as ransomware but is designed to destroy data, as seen in NotPetya.
Impact
Ransomware has evolved into one of the most damaging cyber threats. Victims face not only downtime and data loss but also regulatory fines and reputational damage if sensitive data is leaked. The costs of remediation often far exceed ransom payments. For SecOps teams, ransomware is a top priority because it combines technical disruption with business consequences, requiring both security defenses and incident response readiness.
Further reading
- Europol: Internet Organised Crime Threat Assessment. Read more
- CISA: Ransomware guidance. Read more
- NIST: Ransomware Risk Management. Read more
- Symantec: Ransomware families overview. Read more