Cybersecurity Reference > Glossary
What is Ransomware?
Once it infiltrates a network, it typically encrypts files and displays a ransom note demanding payment—usually in cryptocurrency—in exchange for the decryption key. The reality is grimmer than it sounds: paying doesn't guarantee recovery, and it funds criminal enterprises that use those profits to develop more sophisticated attacks.
Modern ransomware operations have evolved into full-fledged criminal businesses, complete with customer service portals, negotiation teams, and even "ransomware-as-a-service" models where affiliates carry out attacks using another group's tools.
Some variants exfiltrate sensitive data before encryption, threatening to publish it if the ransom isn't paid—a tactic called double extortion. Triple extortion adds another layer, targeting customers or partners of the victim. The attacks have grown more targeted, with criminals researching victims to understand how much they might pay and which systems matter most to their operations.
Origin
Ransomware remained relatively dormant until the mid-2000s, when improved encryption algorithms and anonymous payment methods made it viable at scale. The 2013 emergence of CryptoLocker marked a turning point—it used strong encryption that was genuinely difficult to break and leveraged Bitcoin for anonymous payments.
From there, the threat exploded. WannaCry in 2017 infected hundreds of thousands of computers worldwide, exploiting a Windows vulnerability and demonstrating how quickly ransomware could spread. NotPetya followed weeks later, causing billions in damages while masquerading as ransomware but functioning more like a wiper. These incidents proved that ransomware had evolved from a nuisance into a strategic threat capable of disrupting critical infrastructure, healthcare systems, and supply chains.
Why It Matters
The financial impact extends well beyond ransom payments—recovery costs, business interruption, regulatory fines, legal fees, and reputation damage often dwarf the initial demand. The average downtime now stretches into weeks, and some organizations never fully recover.
What makes ransomware particularly insidious is how it exploits human and organizational weaknesses: phishing emails, unpatched systems, poor access controls, inadequate backup strategies. Attackers often maintain access for weeks or months before deploying ransomware, mapping networks and disabling backups to maximize impact.
The rise of ransomware-as-a-service has lowered the barrier to entry, enabling less sophisticated criminals to launch devastating attacks. Meanwhile, geopolitical tensions have blurred lines between criminal gangs and state-sponsored actors, with some groups operating with apparent impunity from countries that benefit from the chaos they create.
The Plurilock Advantage
When prevention fails, our emergency response team mobilizes rapidly to contain the threat, preserve forensic evidence, and guide recovery decisions.
We've seen every variant and negotiation tactic, and we help organizations navigate the impossible choices ransomware creates—not with generic playbooks, but with experienced practitioners who understand the technical and strategic dimensions of each incident.
.




