IsThisAScam
முகப்புBlogவிலைபற்றிHistoryAPIExtension
Upgrade
TA
Sign in
Sign in
IsThisAScam

Independent scam & phishing analysis. Free for individuals. APIs for developers.

Operated by Zeplik, Inc.
தயாரிப்பு
  • Home
  • Blog
  • Pricing
  • பற்றி
  • History
  • Chrome Extension
Resources
  • Developers
  • API ஆவணங்கள்
  • Phishing brief
  • Romance scams
  • Tech support
  • Crypto scams
  • Apple scams
  • PayPal scams
சட்டம்
  • தனியுரிமைக் கொள்கை
  • சேவை விதிமுறைகள்
  • product@zeplik.com

© 2026 Zeplik, Inc. அனைத்து உரிமைகளும் பாதுகாக்கப்பட்டவை.

Built for the calm, the cautious, and the careful.

Home/Glossary/Ransomware
Glossary · Technical Concept

What Is Ransomware?

Malicious software that encrypts a victim's files or locks them out of their system, then demands a ransom payment (typically in cryptocurrency) in exchange for the decryption key to restore access.

Quick Definition

Malicious software that encrypts a victim's files or locks them out of their system, then demands a ransom payment (typically in cryptocurrency) in exchange for the decryption key to restore access.

Think you've been targeted?

Paste the suspicious content here for an instant analysis.

No signup · 6 detection layers · Results in seconds · Cmd+Enter

01Ransomware explained.

Ransomware has become the most financially devastating form of cybercrime. Attackers encrypt a victim's files — documents, photos, databases — making them completely inaccessible, then demand payment for the decryption key. Global ransomware damage costs are projected to exceed $265 billion annually by 2031.

Modern ransomware gangs operate like businesses, with customer support portals, negotiation teams, and even affiliate programs where they sell their ransomware tools to other criminals in exchange for a percentage of the proceeds (Ransomware-as-a-Service).

Double and triple extortion tactics have emerged: attackers not only encrypt data but also steal it and threaten to publish it publicly if the ransom isn't paid. Some also DDoS the victim's infrastructure as additional pressure.

02How it works.

01Ransomware is delivered through phishing emails, exploited vulnerabilities, or compromised websites
02Once executed, it rapidly encrypts files across the local system and any connected network drives
03A ransom note appears demanding payment in cryptocurrency (usually Bitcoin or Monero)
04Victims are given a deadline, with threats to increase the ransom or delete the decryption key
05If paid, victims may receive a decryption key — but there's no guarantee, and paying funds future attacks

03Real-world example.

The 2021 Colonial Pipeline ransomware attack shut down the largest fuel pipeline in the United States for nearly a week, causing fuel shortages across the East Coast. The company paid a $4.4 million ransom, though the FBI later recovered approximately $2.3 million of the payment.

04How to protect yourself.

01Maintain regular, offline (air-gapped) backups of all important files
02Keep all software updated — ransomware often exploits known vulnerabilities
03Don't open unexpected email attachments or click suspicious links
04Use endpoint protection software with ransomware-specific detection
05Implement network segmentation to limit ransomware's lateral movement
Related Terms
MalwarePhishingCryptocurrency ScamSocial Engineering
Explore Scam Types
phishingromancecryptoinvestmenttech supportdelivery
Suspect Something?

Run a scan on the message you received.

Run a scan →