

Once the user acts on the malicious code, ransomware may run its course and attack the files, folders, or the entire computer depending on its configuration. Ransomware may remain dormant on the device until the device is vulnerable, and the user acts on it.

Once the victim’s device is exposed to the malicious code residing in the infected files, the ransomware code takes control of the device or the system. In general cases, ransomware inflicted infection happens by a downloadable PDF file, DOC file, XLS file, etc. Ransomware attacks usually begin with a conventional phishing email that serves as a pathway for the infected file to reach the victim’s machine. According to the Vectra 2019 Spotlight Report, recent ransomware attacks have targeted cloud, data center, and enterprise infrastructures. This is done using a drive-by download or via infected USB sticks, pop-ups, social media, malvertising, infected programs, a traffic distribution system (TDS), self-propagation, etc. The attacker can spread malware to a network of computers using various distribution techniques, such as attachments or links in phishing emails, by infected websites. The victim’s device may include a computer, a smartphone, a wearable device, a point-of-sale (POS) electronic unit, or any other endpoint terminal.Ī ransomware attack can target an individual, an organization, or a network of organizations and business processes.

This form of attack takes advantage of system networks and system users and exploits software vulnerabilities to infect and hijack the victim’s device. A ransomware attack compromises a user’s computer by either locking the user out of the system or encrypting the files on the computer and then demanding a payment (usually in Bitcoin) to restore the system or files. Ransomware attack exploits the open security vulnerabilities by infecting a PC or a network with a phishing attack, or malicious websites.

A ransomware attack is defined as a form of malware attack in which an attacker seizes the user’s data, folders, or entire device until a ‘ransom’ fee is paid.
