{"id":459,"date":"2024-10-02T07:00:00","date_gmt":"2024-10-02T07:00:00","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=459"},"modified":"2024-10-02T07:00:00","modified_gmt":"2024-10-02T07:00:00","slug":"ransomware-explained-how-it-works-and-how-to-remove-it","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=459","title":{"rendered":"Ransomware explained: How it works and how to remove it"},"content":{"rendered":"<div>\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<div class=\"container\"><\/div>\n<h2 class=\"wp-block-heading\">What is ransomware?<\/h2>\n<p>Ransomware is a form of\u00a0malware\u00a0that encrypts or blocks access to a victim\u2019s files, data, or systems until a ransom is paid. When under such an attack, users are shown instructions for how to pay a fee to get the decryption key. The costs for enterprises hit with ransomware can range from hundreds to thousands to millions of dollars, payable to cybercriminals in Bitcoin.<\/p>\n<h2 class=\"wp-block-heading\">Ransomware attacks are common and costly<\/h2>\n<p>According to the Sophos State of Ransomware 2024 <a href=\"https:\/\/www.csoonline.com\/State%20of%20Ransomware%202024%20report\">survey<\/a>\u00a0of 5,000 IT and cybersecurity leaders released in April, 59% of organizations were hit by a ransomware attack in 2023. Of those victims, 56% paid a ransom to get their data back. Exploited vulnerabilities were the most commonly identified root cause of an attack, impacting 32% of organizations. This was closely followed by compromised credentials (29%) and malicious email (23%).\u00a0<\/p>\n<p>Ransoms being demanded and \u2014 in many cases \u2014 paid are growing. In 63% of cases the ransom demand was for $1 million or more \u2014 $4.3 million, on average. Of the 1,097 respondents who shared their payment details, the average payment was $4 million \u2014 up from $1.5 million in 2023. But attacks such as <a href=\"https:\/\/www.csoonline.com\/article\/654846\/mgm-ransomware-attack-costs-100-million-in-busy-month-for-breaches.html\">\u00a0ransomware attack in 2023 cost MGM Resort International casino $100 million<\/a> can be dramatically more costly.<\/p>\n<p>Similarly, according to a <a href=\"https:\/\/www.cisa.gov\/news-events\/news\/cyber-hygiene-helps-organizations-mitigate-ransomware-related-vulnerabilities\">2024 report<\/a> by <a href=\"https:\/\/www.csoonline.com\/article\/567457\/what-is-the-cisa-how-the-new-federal-agency-protects-critical-infrastructure-from-cyber-threats.html\">Cybersecurity and Infrastructure Security Agency (CISA)<\/a>, ransomware continues to evolve and disrupt with \u201ccritical services, businesses, and communities worldwide, causing costly incidents that are increasingly destructive and disruptive.\u201d According to the report, it costs businesses an average of $1.85 million to recover from a ransomware attack.\u00a0<\/p>\n<p>Adding salt to the wound, 80% of victims who paid a ransom were targeted and victimized again by criminals, CISA reported.\u00a0The economic, technical, and reputational impacts of ransomware incidents, throughout the initial disruption and, at times, extended recovery, continue to pose a challenge for organizations large and small, according to CISA.\u00a0<\/p>\n<h2 class=\"wp-block-heading\">What is ransomware as a service (RaaS)<\/h2>\n<p>Ransomware as a service (RaaS) allows cybercriminals to offer ransomware software to other individuals or groups for a fee. While of course a criminal activity, it follows the same model as software-as-a-service, infrastructure-as-as-service, and other cloud-based services. This allows individuals with limited technical skills to launch ransomware attacks without needing to develop the malware themselves. RaaS has made it easier for cybercriminals to launch ransomware attacks, increasing the frequency and sophistication of these attacks \u2014 and of <a href=\"https:\/\/www.csoonline.com\/article\/2069830\/the-state-of-ransomware.html\">AI is only making it easier<\/a>.<\/p>\n<p>RaaS platforms often provide would-be criminals the following cloud-based services:<\/p>\n<p>RaaS providers develop and maintain services such encryption algorithms and decryption keys.<\/p>\n<p>RaaS platforms can help distribute the ransomware to potential victims, often through phishing campaigns or exploiting vulnerabilities in software.<\/p>\n<p>RaaS providers offer payment processing: services to help collect and launder ransom payments, making it difficult for law enforcement to trace the funds.<\/p>\n<p>Much like legitimate businesses, RaaS providers often offer customer support.<\/p>\n<h2 class=\"wp-block-heading\">How ransomware works<\/h2>\n<p>There are a number of ways that ransomware can access a computer. One of the most common delivery systems is <a href=\"https:\/\/www.csoonline.com\/article\/514515\/what-is-phishing-examples-types-and-techniques.html\">phishing<\/a> spam \u2014 attachments that come to the victim in an email, masquerading as a file they should trust. Once they\u2019re downloaded and opened, they can take over their computer, especially if they have built-in <a href=\"https:\/\/www.csoonline.com\/article\/571993\/social-engineering-definition-examples-and-techniques.html\">social engineering<\/a> tools that trick users into allowing administrative access. Some other, more aggressive forms of ransomware, such as <a href=\"https:\/\/www.csoonline.com\/article\/563255\/petya-ransomware-and-notpetya-malware-what-you-need-to-know-now.html\">NotPetya<\/a>, exploit security holes to infect computers without needing to trick users.<\/p>\n<p>Once it\u2019s taken over the victim\u2019s computer, there are several things the malware might do, but by far the most common action is to encrypt some or all of the user\u2019s files. The Infosec Institute offers an <a href=\"https:\/\/resources.infosecinstitute.com\/a-brief-summary-of-encryption-method-used-in-widespread-ransomware\/#gref\">in-depth look at how several flavors of ransomware encrypt files<\/a>, but the most important thing to know is that at the end of the process, the files cannot be decrypted without a mathematical key known only by the attacker. The user is presented with a message explaining that their files are now inaccessible and will be decrypted only if the victim sends an untraceable Bitcoin payment to the attacker.<\/p>\n<p>In some forms of malware, the attacker might <a href=\"https:\/\/www.computerworld.com\/article\/2507340\/security0\/ransomware-squeezes-users-with-bogus-windows-activation-demand.html\">claim to be a law enforcement agency<\/a> shutting down the victim\u2019s computer due to the presence of pornography or pirated software on it, and demanding the payment of a \u201cfine,\u201d perhaps to make victims less likely to report the attack to authorities. However, most attacks don\u2019t bother with this pretense. There is also a variation, <a href=\"https:\/\/techtalk.gfi.com\/the-evolution-of-extortionware\/\">called leakware or doxware,<\/a> in which the attacker threatens to publicize sensitive data on the victim\u2019s hard drive unless a ransom is paid. But because finding and extracting such information is a very tricky proposition for attackers, encryption ransomware is by far the most common type.<\/p>\n<h2 class=\"wp-block-heading\">Who is targeted for ransomware attacks?<\/h2>\n<p>There are several ways attackers <a href=\"https:\/\/www.csoonline.com\/article\/562297\/who-is-a-target-for-ransomware-attacks.html\">choose the organizations they target with ransomware<\/a>. Sometimes it\u2019s a matter of opportunity: For instance, attackers might target universities because they tend to have smaller security teams and a disparate user base that does a lot of file sharing, making it easier to penetrate their defenses.<\/p>\n<p>On the other hand, some organizations are tempting targets because they seem more likely to pay a ransom quickly. For instance, government agencies or <a href=\"https:\/\/www.csoonline.com\/article\/3531730\/microsoft-warns-of-ransomware-attacks-on-us-healthcare.html\">healthcare <\/a>facilities often need immediate access to their files. Law firms and other organizations with sensitive data may be willing to pay to keep news of a compromise quiet \u2014 and these organizations may be uniquely sensitive to leakware attacks.<\/p>\n<p>But don\u2019t feel like you\u2019re safe if you don\u2019t fit these categories: As noted, some ransomware spreads automatically and indiscriminately across the internet.<\/p>\n<h2 class=\"wp-block-heading\">How to prevent ransomware<\/h2>\n<p>There are a number of defensive steps you can take to <a href=\"https:\/\/www.csoonline.com\/article\/559783\/the-evolution-of-and-solution-to-ransomware.html\">prevent ransomware infection<\/a>. These steps are, of course, good security practices in general, so following them improves your defenses from all sorts of attacks:<\/p>\n<p>Keep your\u00a0<strong>operating system patched and up-to-date<\/strong>\u00a0to ensure you have fewer vulnerabilities to exploit.<\/p>\n<p>Don\u2019t\u00a0<strong>install software or give it administrative privileges<\/strong> unless you know exactly what it is and what it does.<\/p>\n<p>Install\u00a0<a href=\"https:\/\/www.csoonline.com\/article\/562603\/best-antivirus-software-13-top-tools.html\"><strong>antivirus software<\/strong><\/a>, which detects malicious programs like ransomware as they arrive, and\u00a0<a href=\"https:\/\/www.csoonline.com\/article\/561873\/with-new-dynamic-capabilities-will-whitelisting-finally-catch-on.html\"><strong>whitelisting software<\/strong><\/a><strong>, <\/strong>which prevents unauthorized applications from executing in the first place.<\/p>\n<p>And, of course,\u00a0<strong>back up your files,\u00a0<\/strong>frequently and automatically. That won\u2019t stop a malware attack, but it can make the damage caused by one much less significant.<\/p>\n<h2 class=\"wp-block-heading\">How to remove ransomware<\/h2>\n<p>If your computer has been infected with ransomware, you\u2019ll need to regain control of your machine. CSO\u2019s Steve Ragan has a video <a href=\"https:\/\/www.youtube.com\/watch?v=kJuibb9QaWk\">demonstrating how to do this on a Windows 10 machine<\/a>:<\/p>\n<p>The video has all the details, but the important steps are the following and read the complete article:<\/p>\n<p>Reboot Windows 10 to <strong>safe mode<\/strong><\/p>\n<p>Install <strong>antimalware software<\/strong><\/p>\n<p><strong>Scan the system<\/strong> to find the ransomware program<\/p>\n<p><strong>Restore the computer<\/strong> to a previous state<\/p>\n<p>Or read the complete article detailing <strong><a href=\"https:\/\/www.csoonline.com\/article\/559509\/video-how-to-recover-a-system-from-a-ransomware-attack.html\">how to recover a system from a ransomware attack<\/a><\/strong><\/p>\n<p>But here\u2019s the important thing to keep in mind: While walking through these steps can remove the malware from your computer and restore it to your control, it won\u2019t decrypt your files<em>.<\/em> Their transformation into unreadability has already happened and if the malware is at all sophisticated, it will be mathematically impossible for anyone to decrypt them without access to the key that the attacker holds. In fact, by removing the malware, you\u2019ve precluded the possibility of restoring your files by paying the attackers the ransom.<\/p>\n<h2 class=\"wp-block-heading\">Should you pay the ransom?<\/h2>\n<p>Whether or not to succumb to ransom demands depends partly on whether you backed up the data you have on the system that has been infected with <a href=\"https:\/\/www.csoonline.com\/article\/571131\/ransomware-recovery-8-steps-to-successfully-restore-from-backup.html\">malware and can restore it<\/a>. If you\u2019ve lost vital data that you can\u2019t restore from backup, should you pay the ransom?\u00a0<\/p>\n<p>When speaking theoretically, most law enforcement agencies urge you not to pay ransomware attackers, on the logic that doing so only encourages hackers to create more ransomware. That said, many CISOs that find themselves afflicted by malware quickly stop thinking in terms of the \u201cgreater good\u201d and start doing the <a href=\"https:\/\/www.csoonline.com\/article\/3488842\/to-pay-or-not-to-pay-cisos-weigh-in-on-the-ransomware-dilemma.html\" target=\"_blank\" rel=\"noopener\">cost-benefit analysis of paying or not paying<\/a>, weighing the price of the ransom against the value of the encrypted data.<\/p>\n<p>To make the best decision, evaluate whether your data can be restored from backups and whether your cyber insurance covers operational expenses in the event of prolonged business disruption. Both would give enterprises leverage to avoid paying the ransom.<\/p>\n<p>To encourage victims to pay quickly before thinking too much about it, there are often discounts offered for acting fast, so as. In general, the price point is set so that it\u2019s high enough to be worth the criminal\u2019s while, but low enough that it\u2019s often cheaper than what the victim would have to pay to restore their computer or reconstruct the lost data. With that in mind, some companies are beginning to build the potential need to pay ransom into their security plans: For instance, some large UK companies that are otherwise uninvolved with cryptocurrency are <a href=\"https:\/\/bravenewcoin.com\/news\/large-uk-businesses-holding-bitcoin-to-pay-ransoms\/\" target=\"_blank\" rel=\"noopener\">holding some Bitcoin in reserve<\/a> specifically for ransom payments.<\/p>\n<p>There are a couple of things to remember, keeping in mind that the people you\u2019re dealing with are, of course, criminals. First, what looks like ransomware may not have actually encrypted your data at all; make sure you aren\u2019t dealing with so-called \u201c<a href=\"https:\/\/www.csoonline.com\/article\/560871\/updating-apple-ios-will-protect-you-from-this-fake-ransomware-attack.html\" target=\"_blank\" rel=\"noopener\">scareware<\/a>\u201c before you send any money to anybody. And second, paying the attackers doesn\u2019t guarantee that you\u2019ll get your files back. Sometimes the criminals just take the money and run, and may not have even built decryption functionality into the malware. But such malware will quickly get a reputation and won\u2019t generate revenue. For that reason, Gary Sockrider, principal security technologist at Arbor Networks, <a href=\"https:\/\/www.csoonline.com\/article\/562407\/how-does-ransomware-work-understanding-the-economics.html\" target=\"_blank\" rel=\"noopener\">estimates around 65% to 70% of the time<\/a> the crooks come through and your data is restored.<\/p>\n<h2 class=\"wp-block-heading\">Ransomware examples<\/h2>\n<p>While ransomware has technically been around since the \u201890s, it\u2019s only taken off in the past nine years or so, largely because of the availability of untraceable payment methods like Bitcoin.<\/p>\n<p>Below is a list of some of the worst offenders historically as well <a href=\"https:\/\/www.csoonline.com\/article\/3509281\/top-10-ransomware-groups-to-watch.html\">the top ransomware groups to watch<\/a> in 2024. \u00a0<\/p>\n<p><strong><a href=\"https:\/\/www.csoonline.com\/article\/2121646\/lockbit-no-longer-the-worlds-no-1-ransomware-gang.html\">LockBit<\/a>, <\/strong>once a dominant player in the ransomware scene, its activities have been disrupted due to law enforcement actions. However, the ransomware landscape is constantly evolving, and new variants or affiliates of LockBit may still be active<\/p>\n<p><strong><a href=\"https:\/\/www.watchguard.com\/wgrd-security-hub\/ransomware-tracker\/dragonforce\">DragonForce<\/a><\/strong>, uses a leaked ransomware builder originally associated with the notorious LockBit ransomware group.<\/p>\n<p><strong><a href=\"https:\/\/www.csoonline.com\/article\/2139658\/new-ransomhub-ransomware-gang-has-ties-to-older-knight-group.html\">RansomHub<\/a><\/strong>, a RaaS operation that emerged in February 2024 but quickly rose through the ranks. NCC lists it as the top ransomware group by the number of attacks observed in July. According to a\u00a0<a href=\"https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa24-242a\">CISA and FBI advisory<\/a>\u00a0from 29 August, the group has made over 210 victims so far.<\/p>\n<p><strong><a href=\"https:\/\/www.watchguard.com\/wgrd-security-hub\/ransomware-tracker\/apt73\">APT73<\/a><\/strong>, refers to themselves as \u201cAPT\u201d (Advanced Persistent Threat) followed by a number, specifically APT73, which is a ransomware group modeled on LockBit.<\/p>\n<p><strong>dAn0n<\/strong> surfaced at the end of April 2024 and has since posted information about 12 victims on their data leak site. Its data leak site lacks of emphasis on design or a visible logo, which may suggest that the group prioritizes attack methodologies over branding.<\/p>\n<p><strong><a href=\"https:\/\/www.ic3.gov\/Media\/News\/2023\/231218.pdf\">Play<\/a><\/strong>, also known as Playcrypt, is not a newcomer to the ransomware scene, being around since 2022, it has taken advantage of the demise of its bigger peers, possibly attracting some of their affiliates..<\/p>\n<p><strong><a href=\"https:\/\/www.csoonline.com\/article\/1250278\/conti-linked-ransomware-takes-in-107-million-in-ransoms-report.html\">Conti<\/a>, <\/strong>another prominent ransomware group that was significantly impacted by law enforcement operations. While it may have been dismantled, its infrastructure could potentially be reused by other cybercriminal groups<strong>.<\/strong><\/p>\n<p><strong>Akir<\/strong>, appeared in April 2023 and was thought to be an offshoot of the defunct Conti group because its file encryptor shared many code.<\/p>\n<p><strong><a href=\"https:\/\/www.csoonline.com\/article\/1290677\/medusa-group-steps-up-ransomware-activities.html\">Medusa<\/a><\/strong>, a RaaS operation that started in late 2022 and gained prominence in 2023. The group is different from MedusaLocker, another RaaS operation that has been around since 2021.<\/p>\n<p><strong>CryptoLocker<\/strong>, a 2013 attack, launched the modern ransomware age and infected up to 500,000 machines at its height.<\/p>\n<p><strong>TeslaCrypt<\/strong> targeted gaming files and saw constant improvement during its reign of terror.<\/p>\n<p><strong>SimpleLocker<\/strong> was the first widespread ransomware attack that focused on mobile devices.<\/p>\n<p><strong>8Base<\/strong>, a double-extortion ransomware group that started operations in 2022, is a bit of a weird group because it displayed similarities to other data extortion gangs such as RansomHouse, prompting speculation that they might be related.<\/p>\n<p><a href=\"https:\/\/www.csoonline.com\/article\/574771\/amazon-owned-ring-reportedly-suffers-ransomware-attack.html\">BlackCat,<\/a>\u00a0also known as ALPHV, was the second most active ransomware group in 2022, according to cybersecurity conpany Malwarebytes.<\/p>\n<p><a href=\"https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa24-131a\">Black Basta<\/a>, Another suspected Conti offshoot,\u00a0is a ransomware group that first appeared in April 2022 and is believed to have targeted over 500 organizations to date, with 114 victims listed on its in 2024.<\/p>\n<p><a href=\"https:\/\/www.csoonline.com\/article\/3497839\/blackbyte-ransomware-gang-exploits-more-orgs-than-previously-known.html\">BlackByte<\/a>, similar to Black Basta,\u00a0BlackByte is another sophisticated Conti offshoot. While this group does not stand out through the high number of publicly known victims, recent research by Cisco Talos suggests that the group is much more active than previously believed.<\/p>\n<p><strong><a href=\"https:\/\/www.csoonline.com\/article\/563017\/wannacry-explained-a-perfect-ransomware-storm.html\" target=\"_blank\" rel=\"noopener\">WannaCry<\/a><\/strong> \u00a0spread autonomously from computer to computer using EternalBlue, an exploit developed by the NSA and then stolen by hackers.<\/p>\n<p><strong><a href=\"https:\/\/www.csoonline.com\/article\/563255\/petya-ransomware-and-notpetya-malware-what-you-need-to-know-now.html\" target=\"_blank\" rel=\"noopener\">NotPetya <\/a><\/strong>\u00a0also used EternalBlue and may have been part of a Russian-directed cyberattack against Ukraine.<\/p>\n<p><a href=\"https:\/\/www.csoonline.com\/article\/554775\/locky-ransomware-which-infects-like-dridex-hits-the-unlucky.html\" target=\"_blank\" rel=\"noopener\"><strong>Locky<\/strong><\/a> started spreading in 2016 and was \u201c<a href=\"https:\/\/www.csoonline.com\/article\/554775\/locky-ransomware-which-infects-like-dridex-hits-the-unlucky.html\" target=\"_blank\" rel=\"noopener\">similar in its mode of attack to the notorious banking software Dridex<\/a>.\u201d A variant, <strong>Osiris<\/strong>, was spread through phishing campaigns.<\/p>\n<p><strong>Leatherlocker <\/strong>was first discovered in 2017 in two Android applications: Booster &amp; Cleaner and Wallpaper Blur HD. Rather than encrypt files, it locks the home screen to prevent access to data.<\/p>\n<p><strong>Wysiwye, <\/strong>also discovered in 2017, scans the web for open Remote Desktop Protocol (RDP) servers. It then tries to steal RDP credentials to spread across the network.<\/p>\n<p><a href=\"https:\/\/www.csoonline.com\/article\/555089\/cerber-ransomware-sold-as-a-service-speaks-to-victims.html\" target=\"_blank\" rel=\"noopener\"><strong>Cerber<\/strong><\/a> proved very effective when it first appeared in 2016, netting attackers $200,000 in July of that year. It took advantage of a Microsoft vulnerability to infect networks.<\/p>\n<p><a href=\"https:\/\/www.csoonline.com\/article\/563343\/badrabbit-ransomware-attacks-multiple-media-outlets.html\" target=\"_blank\" rel=\"noopener\"><strong>BadRabbit<\/strong><\/a>spread across media companies in Eastern Europe and Asia in 2017.<\/p>\n<p><a href=\"https:\/\/www.csoonline.com\/article\/564908\/samsam-explained-everything-you-need-to-know-about-this-opportunistic-group-of-threat-actors.html\" target=\"_blank\" rel=\"noopener\"><strong>SamSam<\/strong><\/a> has been around since 2015 and targeted primarily healthcare organizations.<\/p>\n<p><a href=\"https:\/\/www.csoonline.com\/article\/569343\/ryuk-explained-targeted-devastatingly-effective-ransomware.html\" target=\"_blank\" rel=\"noopener\"><strong>Ryuk<\/strong><\/a> first appeared in 2018 and is used in targeted attacks against vulnerable organizations such as hospitals. It is often used in combination with other malware like TrickBot.<\/p>\n<p><strong>Maze <\/strong>is a relatively new ransomware group known for releasing stolen data to the public if the victim does not pay to decrypt it.<\/p>\n<p><strong>RobbinHood<\/strong> is another EternalBlue variant that brought the city of Baltimore, Maryland, to its knees in 2019.<\/p>\n<p><strong>GandCrab <\/strong>might be the most lucrative ransomware ever. Its developers, which sold the program to cybercriminals, claim more then $2 billion in victim payouts as of July 2019.<\/p>\n<p><a href=\"https:\/\/www.csoonline.com\/article\/567851\/gandcrab-cousin-sodinokibi-made-a-fortune-for-ransomware-pushers.html\" target=\"_blank\" rel=\"noopener\"><strong>Sodinokibi<\/strong><\/a>targets Microsoft Windows systems and encrypts all files except configuration files. It is related to GandCrab<\/p>\n<p><strong>Thanos<\/strong>, discovered in January 2020. It is sold as ransomware as a service, It is the first to use the RIPlace technique, which can bypass most anti-ransomware methods.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/p>\n<p>This list is just going to get longer. Follow the tips listed here to protect yourself and check out the CISA\u2019s #StopRansomware Guide.<\/p>\n<p><strong>More on ransomware:<\/strong><\/p>\n<p><a href=\"https:\/\/www.csoonline.com\/article\/2069830\/the-state-of-ransomware.html\">The state of ransomware: Faster, smarter, and meaner<\/a><\/p>\n<p><a href=\"https:\/\/www.csoonline.com\/article\/3509281\/top-10-ransomware-groups-to-watch.html\">Top 10 ransomware groups to watch<\/a><\/p>\n<p><a href=\"https:\/\/www.csoonline.com\/article\/2121702\/emerging-ransomware-groups-on-the-rise-who-they-are-how-they-operate.html\">Emerging ransomware groups on the rise: Who they are, how they operate<\/a><\/p>\n<p><a href=\"https:\/\/www.csoonline.com\/article\/570361\/the-worst-and-most-notable-ransomware.html\">The worst and most notable ransomware: A quick guide for security pros<\/a><\/p>\n<p><a href=\"https:\/\/www.csoonline.com\/article\/571131\/ransomware-recovery-8-steps-to-successfully-restore-from-backup.html\">Ransomware recovery: 8 steps to successfully restore from backup<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>What is ransomware? Ransomware is a form of\u00a0malware\u00a0that encrypts or blocks access to a victim\u2019s files, data, or systems until a ransom is paid. When under such an attack, users are shown instructions for how to pay a fee to get the decryption key. The costs for enterprises hit with ransomware can range from hundreds [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":460,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-459","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/459"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=459"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/459\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/460"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=459"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=459"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=459"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}