Component Name: Interactive Columns
Image Size: 1110x512px

Anatomy of an Attack

Ransomware attacks ranges from simplified “ransomware in a box” to customized malware that can shut down networks, cripple financial systems, and incapacitate government services.

Phase 1

Adversaries can easily purchase ransomware from dark-web marketplaces or leverage hosted ransomware services to quickly launch attacks

Phase 2

Adversaries will launch ransomware campaigns, often perpetrating as a trusted colleague or partner to mask the attack.

Phase 3

By masking as a trusted confidant, the recipient unsuspectedly opens the attachment where the ransomware is activated where the payment is demanded.

Phase 4

As the ransomware is activated, locking up the victim’s system, the victim has no choice but to pay the ransom without ever knowing if they will regain control of their systems.