Which type of attack involves holding a computer system captive until you pay to release it?

Someone in your company gets an email. It looks legitimate — but with one click on a link, or one download of an attachment, everyone is locked out of your network. How do you identify ransomware and what should you do to protect your business?

To find out how much you know about ransomware, select the correct response for each question or statement.

1. What is ransomware?

2. Local backup files – saved on your computer – will protect your data from being lost in a ransomware attack. True or False?

3. Which of these best describes how criminals start ransomware attacks?

4. If you encounter a ransomware attack, the first thing you should do is pay the ransom. True or False?

5. Setting your software to auto-update is one way you can help protect your business from ransomware. True or False?


Additional Resources

Check out these additional resources like downloadable guides
to test your cybersecurity know-how.

Which type of attack involves holding a computer system captive until you pay to release it?

Which type of attack involves holding a computer system captive until you pay to release it?

Which type of attack involves holding a computer system captive until you pay to release it?

Get the Materials

Which type of attack involves holding a computer system captive until you pay to release it?

Which type of attack involves holding a computer system captive until you pay to release it?

Which type of attack involves holding a computer system captive until you pay to release it?

Ransomware 

Ransomware is a type of malicious software, or malware, that prevents you from accessing your computer files, systems, or networks and demands you pay a ransom for their return. Ransomware attacks can cause costly disruptions to operations and the loss of critical information and data.

You can unknowingly download ransomware onto a computer by opening an email attachment, clicking an ad, following a link, or even visiting a website that's embedded with malware.

Once the code is loaded on a computer, it will lock access to the computer itself or data and files stored there. More menacing versions can encrypt files and folders on local drives, attached drives, and even networked computers.

Most of the time, you don’t know your computer has been infected. You usually discover it when you can no longer access your data or you see computer messages letting you know about the attack and demanding ransom payments.

Tips for Avoiding Ransomware  

The best way to avoid being exposed to ransomware—or any type of malware—is to be a cautious and conscientious computer user. Malware distributors have gotten increasingly savvy, and you need to be careful about what you download and click on. 

Other tips:

  • Keep operating systems, software, and applications current and up to date. 
  • Make sure anti-virus and anti-malware solutions are set to automatically update and run regular scans.
  • Back up data regularly and double-check that those backups were completed.
  • Secure your backups. Make sure they are not connected to the computers and networks they are backing up.
  • Create a continuity plan in case your business or organization is the victim of a ransomware attack.

Which type of attack involves holding a computer system captive until you pay to release it?

How to Respond and Report 

The FBI does not support paying a ransom in response to a ransomware attack. Paying a ransom doesn’t guarantee you or your organization will get any data back. It also encourages perpetrators to target more victims and offers an incentive for others to get involved in this type of illegal activity. 

If you are a victim of ransomware:

  • Contact your local FBI field office to request assistance, or submit a tip online.
  • File a report with the FBI’s Internet Crime Complaint Center (IC3). 

Resources 

  • 08.22.2022

    FBI Philadelphia Urges Cybersecurity Awareness

    The FBI is engaged in a cybersecurity awareness campaign to warn government and private sector organizations in our region about continued cyber threats.

  • 08.10.2022

    FBI Honolulu Launches Cybersecurity Awareness Campaign

    The FBI Honolulu Field Office has launched a cybersecurity awareness campaign to educate private sector businesses and organizations about the growing threat of cyberattacks.

  • 07.19.2022

    Justice Department Seizes and Forfeits Approximately $500,000 From North Korean Ransomware Actors and Their Conspirators

    The Justice Department announced a complaint filed in the District of Kansas to forfeit cryptocurrency paid as ransom to North Korean hackers.

  • 03.15.2022

    FBI Tampa Asking Businesses to Bolster Defenses Against Ransomware

    The FBI Tampa Cyber Crime Task Force is reminding public and private sector businesses to take the necessary steps to minimize ransomware risks.

  • 03.10.2022

    Former Canadian Government Employee Extradited to the United States to Face Charges for Dozens of Ransomware Attacks Resulting in the Payment of Tens of Millions of Dollars in Ransoms

    Sebastien Vachon-Desjardins was extradited from Canada to the U.S. on an indictment that charges him with conspiracy to commit computer fraud in connection with his alleged participation in a sophisticated form of ransomware known as NetWalker.

  • 03.09.2022

    Sodinokibi/REvil Ransomware Defendant Extradited to United States and Arraigned in Texas

    Yaroslav Vasinskyi, a Ukrainian national, made his initial appearance and was arraigned on charges of conducting ransomware attacks against multiple victims.

  • 03.03.2022

    FBI Memphis Field Office Reminds Tennesseans About the Risk of Ransomware

    The FBI Memphis Field Office is seeing a significant increase in the number of ransomware attacks, which is a type of malicious software or malware.

  • 12.21.2021

    FBI Seattle Warns About Ransomware

    LT Chu, a senior supervisory intelligence analyst for the FBI’s Seattle Field Office, discusses ransomware, malicious software that blocks access to a computer system or files until a “ransom” or monetary amount is paid.

  • 12.01.2021

    Former Employee of Technology Company Charged with Stealing Confidential Data and Extorting Company for Ransom While Posing as Anonymous Attacker

    Nickolas Sharp was arrested for secretly stealing gigabytes of confidential files from a New York-based technology company where he was employed.

  • 10.28.2021

    Russian National Extradited to United States to Face Charges for Alleged Role in Cybercriminal Organization

    Vladimir Dunaev, a Russian national, had his initial appearance in federal court for his alleged role in a transnational, cybercriminal organization.

What are the 4 types of attacks in a software?

What are the four types of attacks? The different types of cyber-attacks are malware attack, password attack, phishing attack, and SQL injection attack.

What are the types of computer attack?

Top 10 common types of cyber security attacks.
Malware..
Phishing..
Man-in-the-Middle (MitM) Attacks..
Denial-of-Service (DOS) Attack..
SQL Injections..
Zero-day Exploit..
Password Attack..
Cross-site Scripting..

What type of malware takes your data hostage until you pay a fee to release it?

What is ransomware? A. Software that infects computer networks and mobile devices to hold your data hostage until you send the attackers money.

What is a computer attack called?

A cyber attack is an attempt to disable computers, steal data, or use a breached computer system to launch additional attacks. Cybercriminals use different methods to launch a cyber attack that includes malware, phishing, ransomware, man-in-the-middle attack, or other methods.