Incident Command Platform
← Glossary

Ransomware

Ransomware is a category of malware that encrypts an organization's files, systems, or entire networks and demands payment -- typically in cryptocurrency -- in exchange for the decryption key. Modern ransomware operations frequently combine encryption with data exfiltration, threatening to publish stolen data if the ransom is not paid, a technique known as double extortion.

How Modern Ransomware Works

Today's ransomware is rarely an automated worm. Most ransomware attacks involve human operators who gain initial access through phishing, compromised credentials, or exploitation of public-facing vulnerabilities. The attacker then spends days to weeks inside the environment -- escalating privileges, disabling security tools, identifying and destroying backups, exfiltrating data, and mapping the network to maximize the impact of encryption. The actual encryption is the final step of a long attack chain.

The Ransomware Response Lifecycle

Why Preparation Matters

Organizations that have practiced ransomware scenarios through tabletop exercises, maintained tested immutable backups, pre-negotiated DFIR retainers, and documented their response playbooks recover dramatically faster and at lower cost than those that improvise. The ransom payment decision is one of the highest-stakes choices an executive will make -- having a pre-established decision framework with legal, financial, and operational criteria is essential.

Be ready before ransomware hits

IR-OS includes ransomware-specific playbooks, tabletop scenarios, and the coordination tools your team needs to respond decisively.

Start free