All ContentHow ransomware can hold your business hostage
How ransomware can hold your business hostage
How ransomware works
Ransomware can make its way onto a system through a variety
of means, with the victim ultimately downloading and installing
a malicious application. Once on the device, the app will spread
throughout the system and encrypt files on the hard drive or simply
lock the system itself. In some cases, it may block access to the
system by displaying images or a message across the device’s screen
to persuade the user to pay the malware operator a ransom for the
encryption key to unlock the files or system.
Bitcoins are a popular form of ransomware
payment because the digital currency is
difficult to trace.
3
Phishing emails
One of the most common distribution
methods of ransomware is phishing emails.
These types of emails attempt to entice
recipients to open an email and click on a
website link. The site may ask for sensitive
information or contain malware, such as
ransomware, that is downloaded onto the
victim’s system.
23% of recipients open phishing
emails and 11% actually click on the
attachments1.
1
4
2015 Verizon Data Breach Investigation Report
Please complete the form to gain access to this content