Technically speaking, almost all components of ransomware, such as spear phishing, watering hole attacks involving popular and trustworthy websites , antivirus evasion techniques or data encryption algorithms, are well-known and have been used separately by hackers since years.