How Ransomware Attacks
By Sophos
Added
Most blogs or papers about crypto-ransomware typically focus on the threat’s delivery, encryption algorithms and communication, with associated indicators of compromise (IOCs). This research paper takes a different approach: an analysis of the file system activity or behaviors of prominent crypto-ransomware families (hereafter, simply called ransomware).
Tags
Extortion Malware Threat actor Endpoint Financial gain Ransomware Data recovery Availability Malware defenses CredentialsTopic Map
