8: Ransomware Names (Expert)

1234567891011
Across
  1. 2. Exfiltrates victims' data before encrypting it and threatens to publish the stolen data if the ransom is not paid.
  2. 5. Initially disguised as the Petya ransomware, targeted organizations through a compromised software update.
  3. 9. Exploited a vulnerability in Windows operating systems, spread rapidly across networks.
  4. 11. Targets large organizations, encrypts critical systems, and steals sensitive data for ransom payment negotiations.
Down
  1. 1. Known for its ransomware-as-a-service (RaaS) model, where affiliates distributed the ransomware and shared profits.
  2. 3. Distributed through malicious email attachments, often in the form of macro-enabled Microsoft Office documents.
  3. 4. Targets large organizations and frequently utilizes vulnerabilities, exploits, or compromised RDP connections.
  4. 6. Targets organizations worldwide using various techniques, including phishing campaigns and exploit kits.
  5. 7. Engages in high-profile attacks on critical infrastructure, employs double extortion tactics.
  6. 8. Disguised as an Adobe Flash installer, embedded into websites using JavaScript injected into the site's HTML code.
  7. 10. Typically deployed following an initial compromise using other malware to gain access.