How does ransomware encrypt files and bring businesses to their knees? Here's a quick breakdown of a typical attack:
-
Infection: Cybercriminals deliver ransomware through phishing emails, malicious websites, compromised software, compromised credentials, or remote access vulnerabilities.
-
Execution: Once inside, the ransomware scans for certain files, locks them up using heavy-duty ransomware encryption, and disables security defenses.
-
Ransom demand: Attackers leave a note demanding payment—usually in cryptocurrency—in exchange for a decryption key or program.
-
Outcome: If you pay, there's no guarantee you'll get your files back. If you don't, you're stuck dealing with data loss, downtime, and cleanup. Not only should you worry about extortion, but threat actors are also engaging in double extortion, where they’ll keep a copy of their victim’s data to use as blackmail if they don’t get their money. Some ransomware actors are even moving straight to exfiltration and extortion, which saves them time. Even if you paid to prevent your files from being leaked, there’s no guarantee that they will delete your data and refrain from further blackmail in the future.
Ransomware isn't just an inconvenience—it's a known business killer, and a well-documented real-world example of a ransomware attack is the Colonial Pipeline ransomware attack in May 2021.
Carried out by the DarkSide ransomware group, Colonial Pipeline's IT systems were attacked and forced to shut down operations, leading to fuel shortages across the US East Coast and causing widespread disruption. The attackers demanded a ransom, and Colonial Pipeline paid $4.4 million in Bitcoin to regain access to its systems. Incidents like this highlight the devastating impact ransomware can have on an organization.
As was covered in the Huntress 2025 Threat Report, the average time for ransomware to go from entry to encryption is under 17 hours with some groups operating under 4 hours, so time is of the essence when trying to stay ahead of these threat actors.
Below is a screenshot of a real conversation between a small business owner and a cybercriminal demanding a $200,000 ransom.