Logo Teldat

โ— Cybersecurity Glossary

What is Ransomware?

Ransomware is malicious software that encrypts files or locks systems and demands payment to restore access. In 2024, Ransomware was present in 44% of all analyzed breaches, with the average cost per incident reaching $5.08 million. This guide covers types, attack vectors, economic impact, and how to build multilayer prevention using NGFW, XDR, ZTNA, and Zero Trust architecture.

Definition and how Ransomware works?

Ransomware is malicious software that encrypts files using strong cryptographic algorithms, rendering them inaccessible, and demands payment in cryptocurrency for the decryption key.

Modern attacks follow a multi-stage process: initial access (phishing, vulnerabilities, stolen credentials), lateral movement to high-value targets, privilege escalation, data exfiltration (stealing data before encryption), encryption across all systems, and the ransom demand with a threat to publish stolen data. This is double extortion the dominant model today.

Key fact: in Q1 2025, 95% of disclosed Ransomware attacks involved data exfiltration. Ransomware is no longer just a data availability problem it is a data confidentiality crisis that backups alone cannot solve.

Types of Ransomware

1
Encrypting Ransomware
Most common. Encrypts files with AES-256/RSA-2048. Files inaccessible without key. In 2024, 70% of attacks led to encryption.
2
Locker Ransomware
Locks the entire device/OS rather than individual files. Full-screen ransom message. Still used against mobile and legacy systems.
3
Double extortion
Encryption + data theft. Exfiltrates data before encrypting, threatens to publish on leak sites. Now the dominant model.
4
Triple extortion
Adds DDoS attacks or contacts customers/partners directly. May threaten to sell data to competitors or on dark web.
5
Ransomware-as-a-Service (RaaS)
Criminal developers lease tools to affiliates for 20-30% of profits. Lowers barrier to entry. Major operations: LockBit, Akira, Play, Qilin.

Attack vectors

1
Phishing and social engineering
Leading vector: 16% of breaches (IBM). Malicious attachments or links. AI-powered phishing harder to detect 45% of leaders report increase.
2
Vulnerability exploitation
Unpatched VPN appliances, firewalls, public apps. 200+ vulnerabilities added to CISA KEV catalog in 2024. VPN gateways are prime targets.
3
Stolen credentials and RDP
Brute-forced or purchased on dark web. RDP provides direct interactive system access once compromised.
4
Supply chain compromise
Doubled in 2024 (~15% of breaches). Compromise of software updates or managed service providers reaches multiple victims.

Economic impact and statistics

Metric Value Source
Presence in breaches 44% Verizon DBIR 2025
Avg. cost per incident $5.08M IBM 2024
Avg. recovery cost $1.53M Sophos 2025
Avg. downtime 24 days Statista 2024
Refusing to pay 64% Verizon 2024
Data exfiltration (Q1 2025) 95% BlackFog 2025
Projected cost by 2031 $265B/year Cybersecurity Ventures

Critical: 94% of victims reported attackers targeted their backup systems, 57% successfully. Backups alone are insufficient they must be immutable, offline, and tested. Prevention and early detection are now more critical than recovery.

The Ransomware kill chain

1
Initial access
Entry via phishing, vulnerability, or stolen credentials. Blocked by email security, NGFW with IPS, patching, ZTNA.
2
Lateral movement
Spreads across network. Can take days/weeks. Detected by XDR. Blocked by Zero Trust microsegmentation.
3
Privilege escalation
Gains admin/root access. Limited by identity-based access control and least privilege policies.
4
Data exfiltration
Copies sensitive data for double extortion. Detected by XDR/ NDR (unusual data flows, large transfers, C2 connections).
5
Encryption and ransom demand
Deploys payload across systems. Prevention has failed at this stage focus shifts to containment, recovery from immutable backups, and forensics.

Multilayer prevention strategy

Layer 1: perimeter and network security

NGFW with IPS blocks exploits, malicious traffic, and C2 at the network edge. Web filtering prevents phishing sites. SSL inspection reveals threats in encrypted traffic.

Layer 2: detection and response

XDR correlates signals across endpoints, network, cloud, and email to detect lateral movement, data exfiltration, and encryption activity. AI detects novel threats. Automated response isolates devices in seconds.

Layer 3: access control and Zero Trust

ZTNA replaces VPN with application-level access. Microsegmentation isolates network zones. MFA + continuous device verification ensure stolen passwords alone are insufficient.

Layer 4: backup and recovery

Immutable, offline backups stored in isolated environments. Tested regularly. Defined RTOs and RPOs rehearsed, not just documented.

Layer 5: human layer

Security awareness training, phishing simulations, clear reporting procedures. The human layer complements every technical control.

Teldat multilayer Ransomware defense

be.Safe Pro: NGFW at every branch

IPS (15,000+ signatures), web filtering (84 categories), application control (4,000+ decoders), anti-malware, SSL inspection. Embedded in SD-WAN routers with ZTP no separate appliances.

be.Safe XDR: AI-powered detection

Personalized ML models detect lateral movement, data exfiltration, privilege escalation, encryption activity. Automatic network reconfiguration, device isolation, credential revocation, connection blocking containing attacks before encryption.

ZTNA + Zero Trust SD-WAN

ZTNA eliminates exposed VPN gateways. Microsegmentation across all branches prevents Ransomware spread. Each branch is an isolated security zone.

Virtual Patching

When a vulnerability is disclosed before the vendor patch, IPS deploys ad-hoc Virtual Patching signatures to block exploitation at the network level.

Unified defense: NGFW (block access) + XDR (detect movement) + ZTNA (limit blast radius) + Zero Trust SD-WAN (segment branches) + Virtual Patching (protect before patch). Single cloud console. Largest SD-WAN + XDR in Europe.

Frequently asked questions – FAQ’s

โฏ What is Ransomware?

Malicious software that encrypts files and demands payment. Modern variants steal data before encrypting (double extortion).

โฏ What are the main types?

Encrypting, locker, double extortion, triple extortion, and RaaS (developers lease tools to affiliates).

โฏ How does it spread?

Phishing (16% of breaches), vulnerability exploitation, stolen credentials/RDP, supply chain compromise, drive-by downloads.

โฏ How much does it cost?

$5.08M average (IBM 2024). 24 days downtime. $265B projected annual cost by 2031. Healthcare: $7.42M per breach.

โฏ How to prevent it?

Multilayer: NGFW + IPS, XDR, ZTNA, microsegmentation, immutable backups, endpoint protection, security training.

โฏ Should I pay?

64% refuse. Only 46% who paid recovered data. 80% were attacked again. Invest in prevention and immutable backups instead.

Defend against Ransomware with Teldat

be.Safe Pro NGFW, be.Safe XDR, ZTNA, and Zero Trust SD-WAN multilayer Ransomware prevention from initial access to automated response.