Component Name: Interactive Columns
Image Size: 1110x512px

Anatomy of an Attack

Ransomware attacks ranges from simplified “ransomware in a box” to customized malware that can shut down networks, cripple financial systems, and incapacitate government services.

Skyline
Phase 1
Develop

Adversaries can easily purchase ransomware from dark-web marketplaces or leverage hosted ransomware services to quickly launch attacks

Phase 2
Deliver

Adversaries will launch ransomware campaigns, often perpetrating as a trusted colleague or partner to mask the attack.

Phase 3
Demand

By masking as a trusted confidant, the recipient unsuspectedly opens the attachment where the ransomware is activated where the payment is demanded.

Phase 4
Collect

As the ransomware is activated, locking up the victim’s system, the victim has no choice but to pay the ransom without ever knowing if they will regain control of their systems.