Step 1: Entry point is through email that includes a link or document leading to a hijacked website
82% of malicious websites are hacked legitimate sites (Source: SOPHOS)
Step 2: The email includes deceiving message forces individuals to open the link or document, tricking them it’s important or personal
Step 3: This leads to an infected system and the malware starts downloading all the data on the device and locks it with a password.
Step 4: A message appears on the victim’s screen demanding to pay a ransom with a deadline in order to unlock the password
FACT: Hackers can make $50,000 a day (Source: SOPHOS)