Search crimes – how the Gootkit gang poisons Google searches – Naked Security

Ransomware makes headlines due to the huge demands for blackmail that normally reach the end of ransomware attacks.

In fact, the word “ransom” expresses only half of the drama today, because modern ransomware attacks often involve criminals making copies of all of your data before shuffling it.

The crooks then demand a combination of payment, part ransom and part secret money.

You are not only paying to get local copies of your messy data, but you are also paying for a promise by criminals that they will delete all the data they have just stolen, rather than releasing it to the public.

But what about starting a ransomware attack?

Technically, this is usually much more interesting – and often more important as well, since many ransomware attacks are just the final blow to your network at the end of what may have been a prolonged attack that lasted for days, weeks or even months.

Given the danger that arises as soon as criminals infiltrate your network, it is as important to learn how malware is distributed in the first place as to know what happens to your files when the ransomware finally shuffles them.