Ransomware and extortion
Learn how to better protect your organization from ransomware and extortion
Microsoft top ransomware resources
Reference
Frequently asked questions
Concept
- What are the stages in a ransomware attack?
- How do I detect pre-ransom activities?
- How do I back-up and restore post ransomware attack?
- How do I proactively hunt for ransomware?
- Can I download a ransomware incident response playbook?
- What are common types of malware that are used in ransomware campaigns?
Prevalent ransomware trends
Reference
- Recent Microsoft Security ransomware blog - May 2024
- Recent Microsoft social media posts about ransomware
- Hands-on-keyboard (HOK) and pre-HOK attacks
- Automatic disruption of ransomware attacks
- Threat actor highlight - BlackCat
- Insights on ransomware and extortion - Microsoft Digital Defense Report 2023
Blogs
Reference
- Moonstone Sleet emerges as new North Korean actor with new bag of tricks - May 2024
- Ransomware as a service. Understanding the cybercrime gig economy and how to protect yourself
- How Microsoft protects against ransomware
- Octo Tempest - A recurring ransomware threat
- Building an anti-ransomware program at Microsoft focused on an Optimal Ransomware Resiliency State