🔒 Ransomware

Encryption-based extortion attack targeting files, databases, or entire systems with ransom demands for decryption keys.

33 procedures8 lifecycle stages

Triage

(4 procedures)

Containment

(4 procedures)
Sponsored

Preservation

(4 procedures)

Collection

(4 procedures)

Analysis

(5 procedures)

Eradication

(5 procedures)

Recovery

(4 procedures)

Post-Incident Review

(3 procedures)