Search for crimes: how the Gootkit gang poisons Google searches – Naked Security

Ransomware reaches the big headlines, due to the huge blackmail demands that usually come at the end of ransomware attacks.

In fact, the word “rescue” only expresses half of the drama these days, because modern ransomware attacks often involve thieves making copies of all your data before encrypting it.

The offenders then demand a combined payment, a ransom portion and a portion of the money.

Not only do you pay for local copies of your data not to be encrypted, but you also pay for a promise from thieves that they will delete all data you just stole instead of posting it to the public.

But what about the onset of a ransomware attack?

Technically, it’s often much more interesting, and often also more important, since many ransomware attacks are just the final blow to your network at the end of what could have been a prolonged attack for days, weeks, or even months.

Given the danger that comes up as soon as thieves sneak into your network, it’s as important to know how malware is distributed in the first place as it is to know what happens to your files when ransomware finally scrambles them.