← Vissza a Bloghoz

What Is Ransomware and How Does It Work?

CybersecurityMar 17, 2026·8 perc olvasás
Ransomware attack visualization

Imagine turning on your computer and seeing a message: "All your files have been encrypted. Pay $5,000 in Bitcoin within 72 hours or your data will be permanently deleted." This is ransomware — and it's one of the most devastating cyber threats of our time.

In 2025, ransomware attacks caused over $30 billion in damages worldwide. Hospitals were forced to turn away patients. Schools lost years of records. Small businesses closed permanently. No one is immune.

How Ransomware Works: Step by Step

Stage 1: Infection

Ransomware enters your system through one of these vectors:

Stage 2: Execution & Persistence

Once inside, the ransomware:

  1. Disables antivirus and security tools
  2. Establishes persistence (survives reboots)
  3. Spreads to other devices on the network
  4. Identifies and deletes backup copies (Shadow Copies on Windows)
  5. Communicates with the attacker's command server to receive encryption keys

Stage 3: Encryption

The ransomware encrypts your files using military-grade encryption (typically AES-256). It targets documents, photos, databases, and backups. The encryption key is stored only on the attacker's server.

Modern ransomware encrypts files selectively — it skips system files so your computer still boots and you can see the ransom note.

Stage 4: Ransom Demand

A note appears demanding payment in cryptocurrency (usually Bitcoin or Monero). Demands range from $500 for individuals to millions for organizations. A countdown timer creates urgency.

Double and Triple Extortion

Modern ransomware gangs don't just encrypt — they also steal your data first. If you refuse to pay for decryption, they threaten to publish your sensitive files online. This is "double extortion."

"Triple extortion" adds a DDoS attack against your organization while you're trying to recover, and contacting your customers or partners to pressure you into paying.

5 Biggest Ransomware Attacks in History

  1. WannaCry (2017) — infected 200,000+ computers in 150 countries in hours, crippling the UK's NHS healthcare system
  2. NotPetya (2017) — caused $10 billion in damages, primarily targeting Ukraine but spreading globally
  3. Colonial Pipeline (2021) — shut down the largest US fuel pipeline, causing gas shortages across the East Coast
  4. Kaseya (2021) — supply chain attack affecting 1,500+ businesses through a single software provider
  5. MOVEit (2023) — exploited a file transfer tool used by governments and corporations, affecting 60+ million people

How to Protect Yourself

For Individuals

For Organizations

What to Do If You're Infected

  1. Disconnect immediately — unplug the infected device from the network to prevent spreading
  2. Don't pay — only 65% of victims who pay get their data back
  3. Report it — contact law enforcement (FBI IC3 in the US, Action Fraud in the UK)
  4. Check No More Ransom — the project at nomoreransom.org has free decryption tools for many ransomware variants
  5. Restore from backups — wipe the infected system and restore clean backups

FAQ

Should I pay the ransomware ransom?

Law enforcement agencies universally advise against paying. Only 65% of victims who pay actually get their data back, and paying encourages more attacks. Focus on prevention and backups instead.

Can ransomware spread through email?

Yes, email is the most common delivery method. Ransomware is typically hidden in attachments (Word docs with macros, PDFs, ZIP files) or delivered via links to malicious websites.

Can antivirus software stop ransomware?

Modern antivirus can detect known ransomware variants, but new strains are created daily. Anti-ransomware features that detect suspicious file encryption behavior provide better protection than signature-based detection alone.

Can ransomware infect my phone?

Yes, mobile ransomware exists, though it's less common. It typically locks your screen rather than encrypting files. Stick to official app stores and keep your phone updated.

Related Tools