IDG Contributor Network: Ransomware 2.0: Anatomy of an emerging multibillion business

Technically speaking, almost all components of ransomware, such as spear phishing, watering hole attacks involving popular and trustworthy websites , antivirus evasion techniques or data encryption algorithms, are well-known and have been used separately by hackers since years.

Article Link: