What happens next?
After initial exposure such as via the email and web examples, the ransomware takes
further action:
Ì
It contacts the attacker’s Command & Control server, sending information about the
infected computer and downloading an individual public key for it.
Ì
Specific file types (which vary by ransomware type) such as Office documents,
database files, PDFs, CAD documents, HTML, XML, etc., are encrypted on the local
computer, removable devices and all accessible network drives.
Ì
Automatic backups of the Windows operating system (shadow copies) are frequently
deleted to prevent data recovery.
Ì
A message appears on the desktop explaining how the ransom can be paid (typically in
Bitcoins) in the specific time frame