What Is Ransomware? How It Works & How to Avoid It

Ransomware is the most prominent and disruptive type of malware currently in existence. A single attack can cause millions of dollars in damages and require hundreds of hours of recovery before the victim can start using the infected devices again.

This article is an introduction to ransomware and the dangers of extortion software. We explain what this malware is and how it works, examine the current ransomware landscape, and offer advice on how best to counter this cyber threat.

Ransomware (intro)

Ransomware Definition

Ransomware is an ever-evolving malware that blocks access to files or devices until the victim pays a ransom. Most ransomware use encryption to make data unusable, allowing attackers to demand money in exchange for the decryption key. If the victim ignores the demand, the attacker deletes the key and, as a result, makes all encrypted data useless.

Ransomware can infect a single PC or a mobile device, but an attack can also go after an entire network. The motive is usually monetary, but some attacks primarily aim to sabotage the target. The consequences of ransomware can be crushing and lead to:

Ransom requests range from a few hundred dollars to millions. Most attackers demand payment in Bitcoins, a choice of currency that allows the criminal to remain anonymous after receiving the money.

Hackers use ransomware to target SMBs, enterprises, public organizations, and individual users. This type of malware is also a danger to all OSs, including Windows, Linux, and Mac. No business or system is safe, so ransomware prevention must be a part of every cybersecurity strategy.

Read about cybersecurity best practices that help counter ransomware and other prominent online threats.

The Current State of Ransomware

Ransomware continues to evolve as criminals work on new tactics for exploiting the advances in cloud computingvirtualization, and edge computing. Below are the most notable trends currently shaping the ransomware landscape:

Our article about ransomware statistics presents eye-opening facts that demonstrate the danger behind this cyber threat.

Ransomware stats and numbers for 2021

How Does Ransomware Work?

All ransomware attacks start with an initial infection when a malicious payload enters the system. Once the program is within the system, the ransomware executes a malicious binary. Depending on the type of malware, the goal of the payload is to:

Once the program completes its task, the user loses access to files or the entire computer. The device displays a message explaining that the system is the victim of ransomware and that the only way to regain control or retrieve data is to pay a ransom. The two common ways programs display this message are:

Typically, every ransom has two deadlines to put pressure on the victim. The first deadline is when the hacker threatens to double the ransom, while the other is when the attacker plans to delete the decryption key.

Most ransomware relies on asymmetric encryption. This type of cryptography uses a pair of unique keys to encrypt and decrypt data. One key encrypts the victim’s files, and the only way to retrieve data is to use the key stored on the hacker’s server. Most ransomware programs use a different decryption key for each target file.

A cyber kill chain allows a security team to define each step in a ransomware attack and use it as an opportunity to detect and stop the threat.

How Does Ransomware Spread?

Here are the most common methods criminals use to spread ransomware:

Most top-tier ransomware can spread via the network after infecting the initial victim. In many cases, the infected device is an endpoint and not the objective of the attack. Typical targets are databases and servers, so most programs use self-propagating mechanisms to spread to other systems.

Common ransomware attack vectors

Who Does Ransomware Target?

Ransomware criminals attack anyone they can, but their primary targets are companies that seem willing to pay a hefty ransom quickly. Most attacks go after victims that:

Do not feel safe if your business does not fall under these criteria. Criminals are opportunistic and will not miss a chance to go after anyone vulnerable. Also, some ransomware spreads automatically across the Internet, so every company is a potential target regardless of size, industry, or income level.

How Many Types of Ransomware Are There?

While all ransomware programs follow a similar blueprint, there are two main types of these cyberattacks:

Locker ransomware is the less dangerous type as these attacks do not move over the network or corrupt files. This malware is also easier to remove without paying the ransom, which is why locker hackers often act as police officers to pressure the victim into paying quickly.

When companies began to rely on better data backups, criminals started to work on a new ransomware variant. A Doxware attack looks to exfiltrate data from the target system. If the program steels the data, the attacker demands a ransom with the threat of leaking files or selling them to the highest bidder.

Some programs can first exfiltrate the data and then encrypt files. A mix of crypto and Doxware capabilities allows an attacker to use both extortion tactics.

Our article about different ransomware examples provides an in-depth look at the world’s most notorious extortion programs.

How to Avoid Ransomware?

Ransomware can be hard to stop, but a combination of employee awareness, proactive response planning, and basic security hygiene can help. Below are the best practices every business should implement to protect against ransomware:

The best way to minimize the threat of ransomware is to use immutable backups. This type of backup is uneditable, so intruders cannot encrypt, delete, or alter the info. Back up data multiple times per day to minimize the risk of losing data if ransomware strikes.

Our article about ransomware prevention presents 18 security practices and measures that help keep this cyber threat at bay.

What to Do in Case of a Ransomware?

Even the best ransomware protection is sometimes not enough to prevent an attack. If you suffer an attack, follow the steps below to minimize the damage and quickly return to business as usual:

  1. Isolate the problem. Take the infected device offline and shut down the network. The program is likely looking for other devices and drives, so remove the possibility of lateral movement.
  2. Assess the damage. Examine each suspicious device. Check for encrypted data, files with strange extensions, and reports of users having trouble opening files. Make a list of all affected systems, including network devices, cloud storage, external hard drives, laptops, PCs, portable devices, etc.
  3. Locate patient zero. You must identify the source of the attack. Look for alerts from your anti-virus and malware programs, EDR system, and monitoring platform.
  4. Identify the ransomware. You need to determine the type of ransomware that attacked your company. Most ransom notes reveal the attacker, but you can also type the message text into a search engine and identify the attacker that way.
  5. Contact the authorities. Police can help identify the attacker, plus there is also a chance that officers have the decryption key for the ransomware in question.
  6. Use backups to restore data. Restore each infected system from a backup. If you have immutable backups, the attack could not affect the backup file, so restore each device to the last safe state. Next, use an anti-malware solution to scan devices for back doors.

If you do not have a viable backup and the police do not possess the decryption key, your options are to either pay the ransom or cut your losses. Paying the ransom may not be the best idea, however, as we explain below.

Ransomware response plan

Should Companies Pay the Ransom?

If a company does not have a data backup and faces weeks or months of recovery, paying the ransom is tempting. However, consider the following before making the decision:

Instead of weighing whether paying the ransom is the right move or not, ensure your company can handle a ransomware attack. With the proper precautions and backups, you will never be in a position where you must consider paying the ransom.

A ransomware attack

Do Not Take Any Risks with Extortion Software

The best way to counter ransomware is to set up sound prevention tactics backed by a well-oiled response plan. Use this article to educate your team about the threat and set up precautions that ensure you can reliably prevent and recover from a ransomware attack. Also, learn more about the differences between Malware vs Ransomware and how they work in our detailed guide.