How Does Ransomware Spread?

Tom LeNeave

Ransomware Explained

There are several ways that ransomware can get into an environment. Tom LeNeave, Sr. Security Consultant at Alagen, explains a few of the most common attack vectors, including emails with malicious attachments or links to ill-intentioned websites and “malvertising.”

– Ransomware spreads usually through one of two methods: (1) the recipient opens an email with either a corrupt attachment or malicious link, or (2) the user clicks on a malicious online advertisement, called malvertising.
– Once the user clicks on a corrupt attachment, link, or advertisment, the ransomware is downloaded and begins its attack.
– While some attacks begin immediately, others lay dormant on a system or computer for awhile to make them more difficult to trace or remove.

Ask an AlaGENIUS: More Ransomware FAQs​

Tom shares the primary components of this financially-motivated type of attack.

Trey clarifies if ransomware attacks are data breaches.

Tom explains why ransomware demands often call for Bitcoin.

Ransomware Protection Services

Alagen has helped organizations of all sizes become ransomware resilient. Guided by established best practices, our Ransomware Resilience Planning service focuses exclusively on ransomware prevention, containment and recovery. Efficiently assessing your strengths and weaknesses, our experts forgo extensive (and time consuming) discovery and documentation to quickly deliver what matters most — prescriptive guidance to decrease your likelihood of a ransomware victimization.

Alagen Cybersecurity Solutions

Alagen is a 100% security services firm with consultants nationwide. A comprehensive partner across the full security lifecycle, Alagen assists with strategic advisory (including CISO as a service), threat + vulnerability management, architecture + integration, and managed services. Unlike many consultants, Alagen is not a reseller. Instead, Alagen pairs deep expertise with a customer-oriented approach that finds the solutions that best address the unique security challenges of each client.

Please explore our website or contact us to learn more about how we can help improve your cyber security.

Become an Insider

Subscribe today to our free eNewsletter for security insights, exclusive invitations, and more.

Alagen Cybersecurity Solutions

Your ace in the cybersecurity foxhole. Follow us on all your social media platforms.

Become an

Alagen Insider

Subscribe today to our free eNewsletter for security insights, exclusive invitations, and more.

© 2020 Alagen, LLC. All rights reserved.