Skip to content

Services, Wiki-Artikel, Blog-Beiträge und Glossar-Einträge durchsuchen

↑↓NavigierenEnterÖffnenESCSchließen

Ransomware

Ransomware is malware that encrypts a victim’s data or locks their systems and demands a ransom to unlock them. It is one of the most costly cyber threats worldwide.

Table of Contents (6 sections)

Ransomware is a category of malicious software (malware) designed to encrypt files or entire systems and then demand a ransom for the decryption key. Modern ransomware groups operate with professional corporate structures, support teams, and even service level agreements (SLAs) guaranteeing decryption upon payment.

History

1989 - AIDS Trojan (PC Cyborg) The first documented ransomware spread via floppy disk at AIDS research conferences. It encrypted filenames and demanded $189 be sent to a post office box address in Panama.

2013 - CryptoLocker The beginning of the modern ransomware era. CryptoLocker was the first to use strong RSA-2048 encryption and Bitcoin for anonymous payments. Within a few months, several million dollars were extorted.

2017 - WannaCry The most devastating global ransomware attack to date. WannaCry exploited the NSA’s EternalBlue exploit for the SMB protocol vulnerability (CVE-2017-0144) and infected over 200,000 systems in 150 countries within hours—including the UK’s NHS and Deutsche Bahn.

2017 - NotPetya Technically disguised as ransomware, but actually a wiper (sabotage). NotPetya caused an estimated $10 billion in damages—the most expensive cyberattack in history.

2019–present – Ransomware-as-a-Service (RaaS) Professionalization of the business model: Developers (core teams) provide their ransomware platforms to affiliates, who carry out the actual attacks and pay a share (typically 20–30%) of the ransom payments.

Technical Process of a Ransomware Attack

Step 1: Initial Access

Most common entry points:

  • Phishing emails with malware attachments or links to drive-by downloads
  • Exploitation of public services: RDP ports (3389), VPN gateways with known vulnerabilities
  • Compromised credentials: Purchased or leaked credentials for VPNs and remote access systems
  • Supply chain compromise: Attacks via software updates (as in the SolarWinds case)

Step 2: Persistence and Privilege Escalation

After gaining initial access, attackers establish persistent backdoors and escalate their privileges to the domain administrator level. This typically occurs via:

  • Exploitation of Active Directory vulnerabilities (Pass-the-Hash, Kerberoasting)
  • Misuse of legitimate tools (LOLBins: PowerShell, WMI, PsExec)
  • Lateral movement: spreading to other systems on the network

Step 3: Discovery and Exfiltration (Double Extortion)

Modern ransomware groups exfiltrate sensitive data before encryption. This enables double extortion: payment for the decryption key AND for the non-publication of the data.

Step 4: Impact - Encryption

Encryption is performed using modern algorithms (AES-256 for files, RSA-2048/4096 for key exchange). Targets are carefully selected:

  • Shadow copies and backups are specifically deleted
  • Domain controllers are encrypted last (maximum impact)
  • High-value file types (databases, email archives, CAD files) are prioritized

Ransomware-as-a-Service (RaaS)

The RaaS model has democratized ransomware: Technically less-savvy attackers (affiliates) can rent professional malware and use infrastructure for payment processing, negotiations, and decryption.

Notable RaaS groups (historical):

  • LockBit (2019–2024): Largest known ransomware group, up to 1,000 victims per month
  • BlackCat/ALPHV (2021–2024): First major group with Go-based, cross-platform ransomware
  • Cl0p (2019–present): Known for exploiting zero-days in MOVEit and GoAnywhere
  • REvil/Sodinokibi (2019–2021): Responsible for the Kaseya attack ($70 million ransom demanded)

Protective Measures

Technical

  • Offline backups (3-2-1 rule): 3 copies, 2 different media types, 1 offsite – and regular recovery testing
  • Network segmentation: Microsegmentation prevents lateral movement
  • Patch management: Critical CVEs must be patched within 72 hours
  • MFA on all remote access: Compromised credentials alone are then insufficient
  • Privilege minimization: No standard user requires domain administrator rights
  • EDR/XDR solutions: Endpoint Detection and Response for behavioral analysis
  • Email filtering: Anti-phishing, DMARC/DKIM/SPF enforcement

Organizational

  • Incident Response Plan: Documented in writing, practiced regularly (Tabletop Exercises)
  • Security Awareness: Employee training and simulated phishing tests
  • Crisis Management Team: Who decides whether to pay or not in an emergency?

Should you pay the ransom?

Official recommendation from BSI, BKA, and Europol: No. Reasons:

  1. Payment funds further criminal activities
  2. No guarantee of decryption (approx. 20% never receive working keys)
  3. Statistical probability of a follow-up attack increases
  4. Potential violation of OFAC sanctions if payment is made to listed groups

In practice, approx. 46% of affected organizations pay (Coveware 2024). The average ransom demand in 2024 was $2.73 million.

In the Event of an Attack: Immediate Actions

  1. Disconnect systems from the network – do not shut them down (preserve forensic evidence)
  2. Notify BSI/BKA (mandatory for KRITIS operators under NIS2)
  3. Activate the Incident Response Team (internal or external)
  4. Check backups – have they been compromised?
  5. Do not negotiate on your own – consult specialists

Further information: AWARE7 Emergency Assistance for Cyberattacks

Sources & References

  1. [1] BSI-Lagebericht zur IT-Sicherheit in Deutschland 2024 - Bundesamt für Sicherheit in der Informationstechnik
  2. [2] Ransomware Task Force - Comprehensive Framework for Action - Institute for Security and Technology
  3. [3] ENISA Threat Landscape 2024 - European Union Agency for Cybersecurity

Questions about this topic?

Our experts advise you free of charge and without obligation.

Free Consultation

About the Author

Jan Hörnemann
Jan Hörnemann

Chief Operating Officer · Prokurist

E-Mail

M.Sc. Internet-Sicherheit (if(is), Westfälische Hochschule). COO und Prokurist mit Expertise in Informationssicherheitsberatung und Security Awareness. Nachwuchsprofessor für Cyber Security an der FOM Hochschule, CISO-Referent bei der isits AG und Promovend am Graduierteninstitut NRW.

11 Publikationen
ISO 27001 Lead Auditor (PECB/TÜV) T.I.S.P. (TeleTrusT) ITIL 4 (PeopleCert) BSI IT-Grundschutz-Praktiker (DGI) Ext. ISB (TÜV) BSI CyberRisikoCheck CEH (EC-Council)
This article was last edited on 03.03.2026. Responsible: Jan Hörnemann, Chief Operating Officer · Prokurist at AWARE7 GmbH. License: CC BY 4.0 - free use with attribution: "AWARE7 GmbH, https://a7.de"

Cookielose Analyse via Matomo (selbst gehostet, kein Tracking-Cookie). Datenschutzerklärung