Skip to content
Fast-turnaround security assessments available — 10+ years development & security experienceGet started
Back to Glossary
Glossary2 min read

Ransomware

Malicious software that encrypts a victim's data and demands payment in exchange for the decryption key.

Ransomware is a category of malware that encrypts files on a victim's system or network, rendering data inaccessible until a ransom is paid, typically in cryptocurrency. Modern ransomware operations have evolved into sophisticated criminal enterprises that combine data encryption with data exfiltration, threatening to publish stolen information publicly if the ransom is not paid.

How It Works

A ransomware attack typically begins with initial access through a phishing email, an exploited public-facing application, or compromised credentials. Once inside the network, the attacker establishes persistence and begins reconnaissance, identifying valuable data, backup systems, and additional systems to compromise. This phase can last days or weeks as the attacker quietly maps the environment and maximizes their reach.

Before encrypting data, modern ransomware operators exfiltrate sensitive files to external servers. This enables double extortion, where victims face both the loss of access to their data and the threat of public disclosure. The attacker then deploys the encryption payload across as many systems as possible simultaneously, targeting file servers, databases, backup repositories, and workstations. Ransomware uses strong encryption algorithms, making recovery without the decryption key practically impossible.

After encryption, the ransomware displays a ransom note with payment instructions and a deadline. Ransom demands range from thousands to millions of dollars depending on the target organization's size and perceived ability to pay. Some ransomware groups operate as service providers, offering ransomware-as-a-service platforms where affiliates conduct attacks and share profits with the developers.

Why It Matters

Ransomware represents one of the most financially destructive threats facing organizations today. Beyond the ransom payment itself, victims face operational downtime, recovery costs, regulatory penalties, and reputational damage. Prevention requires a layered approach: strong perimeter security, regular patching, network segmentation, offline backups, endpoint detection, and employee awareness training. Proactive security assessments that identify and close initial access vectors significantly reduce the likelihood of a successful ransomware attack.

Need your application tested? Get in touch.

Need your application tested?

We find these vulnerabilities in real applications every day.

Request an Assessment