Ransomware is malware that encrypts a victim's files and demands a ransom payment to decrypt them. In 2023, ransomware caused over $30 billion in global damages. Understanding how it works is crucial for defense.
An email with a malicious attachment (Word document, Excel file, PDF) or link. When the victim opens it, a macro or script executes and downloads the ransomware payload.
Attackers scan the internet for machines with Remote Desktop Protocol (port 3389) exposed. They brute-force weak passwords. Once inside, they deploy ransomware manually — this is how most enterprise attacks work.
WannaCry used EternalBlue (NSA exploit) targeting unpatched Windows SMB. It self-propagated across networks without any user interaction.
In May 2017, WannaCry infected 230,000+ computers in 150 countries in 24 hours. It hit the UK National Health Service, Telefónica, FedEx, and many more.
Security researcher Marcus Hutchins discovered WannaCry checked for an unregistered domain. He registered it for $10.69 — and WannaCry stopped spreading globally. This kill switch was a flaw in the malware's design.
Ryuk is a highly targeted ransomware that specifically targets large enterprises. It has generated over $150 million in ransoms.
# Ryuk uses hybrid encryption:
1. Generates unique RSA-2048 key pair per victim
2. Generates unique AES-256 key per file
3. Encrypts each file with AES-256
4. Encrypts the AES key with RSA-2048 public key
5. Stores encrypted AES key with each file
6. Only attacker's RSA private key can decrypt AES key
7. Without private key: mathematically impossible to decrypt
Subscribe to ONLY4YOU and get hands-on access to 40+ premium courses — Ethical Hacking, Kali Linux, Metasploit, Network Hacking, Bug Bounty & more!