Across
- 2. Exfiltrates victims' data before encrypting it and threatens to publish the stolen data if the ransom is not paid.
- 5. Initially disguised as the Petya ransomware, targeted organizations through a compromised software update.
- 9. Exploited a vulnerability in Windows operating systems, spread rapidly across networks.
- 11. Targets large organizations, encrypts critical systems, and steals sensitive data for ransom payment negotiations.
Down
- 1. Known for its ransomware-as-a-service (RaaS) model, where affiliates distributed the ransomware and shared profits.
- 3. Distributed through malicious email attachments, often in the form of macro-enabled Microsoft Office documents.
- 4. Targets large organizations and frequently utilizes vulnerabilities, exploits, or compromised RDP connections.
- 6. Targets organizations worldwide using various techniques, including phishing campaigns and exploit kits.
- 7. Engages in high-profile attacks on critical infrastructure, employs double extortion tactics.
- 8. Disguised as an Adobe Flash installer, embedded into websites using JavaScript injected into the site's HTML code.
- 10. Typically deployed following an initial compromise using other malware to gain access.
