Ransomware Glossary
Antivirus software
Antivirus software provides defense against known malware threats. Often subscription-based, AV software is continuously updated as new threats become known. Anti-virus products can also help with the removal of malware.
Bitcoin
Bitcoin is a type of cryptocurrency based on blockchain technology. Ransom payments are almost always required to be made using Bitcoin.
Cyberattack
This is a general term describing malicious actions by individuals and groups attempting to gain unauthorized access to systems and data for profit, political or other gains.
Cybercriminal
An individual who commits cybercrimes or cyberattacks.
Cyber Hygiene
The methodologies and best practices used to maintain good cyber health and prevent the risk of a cyber incident.
Crypto Ransomware
The term “crypto” refers to the encryption of data and is also a reference to the Cryptolocker ransomware attack that occurred in 2013 and was one of the earlier examples of ransomware.
Cryptovirology
An area of study that looks at the utilization of encryption technology to develop malware.
Data Backup
A data backup is not simply a copy of your data. Data backups are generally conducted periodically in increments and provide the ability to restore to a number of previous points in time. A backup may provide for several intraday restore points, as well as daily, weekly, monthly, etc. for a period of time.
Decryption
The process of returning data to its original state, unencrypted. In order to decrypt data, an encryption key is needed. Without one decryption is impossible.
Encrypt
The process of turning readable data into unreadable code that can only be decrypted with an encryption key.
Locker Ransomware
A form of ransomware that locks files and prevents users from accessing them until a ransom is paid.
Malware
Malware is software specifically designed to harm, disrupt or gain unauthorized access to data or systems.
Offline Backups
Backups stored in a manner that is disconnected from the network. An advantage to an offline backup is that it cannot be accessed remotely by bad actors.
Paysafecard
A service that allows payments without any bank account or credit card information being shared.
Phishing
Phishing is a type of e-mail based security threat used to attempt to gain unauthorized access to a system or data. Phishing e-mail messages are made to look real and seek to get the recipient to click on a link that can result in malware being downloaded onto the device. Phishing attempts are the most common entry point for malware which is why a strong security awareness education program should be an important part of an overall security program.
Ransomware
Phishing is a type of e-mail based security threat used to attempt to gain unauthorized access to a system or data. Phishing e-mail messages are made to look real and seek to get the recipient to click on a link that can result in malware being downloaded onto the device. Phishing attempts are the most common entry point for malware which is why a strong security awareness education program should be an important part of an overall security program.
Remote Desktop Protocol (RDP)
A Microsoft technology that allows users to control a remote Windows PC.
Trojan
Disguised as legitimate software, a Trojan is a type of malicious software used by cybercriminals to gain access to systems and data. Social engineering and phishing attacks are common ways for users to be tricked into.
Worm
A worm is a type of malware that creates copies of itself to spread from device to device. They often create chaos by overwhelming bandwidth and infecting host computers in such a way that they can become involved in botnet attacks which can create a denial of service attacks.