• Skip to primary navigation
  • Skip to main content
  • Skip to footer
Logo of Agilient Security Consultants, Australia

Agilient Security Consultants Australia

The Best Security Consultants

Menu
  • Industries
      • Aviation and Airport Security Consultants Australia
      • Defence Industry Security Consulting
      • Government Security Consulting
      • Healthcare & Hospitals Security Consulting
      • Corrections and Detention
      • Maritime Security Consultant
      • Aged Care Facilities
      • Mining, Oil & Gas
      • Public Venues & Events
      • Rail
      • School and Education Security Consultant
      • Telecommunications Security Consultant
      • Utilities
      • Places of Faith and Worship
    • advice-colleagues-communication-newIndustries
  • Services
      • Cybersecurity Consultants
      • Protective Security
      • Business Resilience
      • Building Security Consultants
      • Security Audits
      • Cyber Audits
      • Data
      • Pandemic Planning
      • Azure
      • Electronic Security
      • IT Disaster Recovery Planning
      • Business Continuity Consultants
      • Identity Theft Consultant​
      • Security Consultants
      • Security Camera and CCTV Consultant
      • ISO
      • Duress Alarms
      • Cloud
      • AWS
      • Awareness Training
      • Penetration Testing
      • Security Risk Assessment Consultants
      • Managed Security Service Provider
      • Protection against Vehicles as a Weapon
    • training-1Services
  • Locations
    • Security Consultant Melbourne
    • Security Consultant Sydney
    • Security Consultant Brisbane
    • Security Consultant Adelaide
    • Security Consultant Canberra
    • Security Consultant Perth
  • Resources
    • menumanagers-dealing-customer-agreTraining
    • working-together-newJoin The Tribe
    • Webinars_3-1.jpgUpcoming and Past Events
    • hacking-detected-shutterstock_newResources
  • Articles
  • About
    • About Us
      We are an Australian owned and operated security company specialising in risk, cybersecurity, protective security, crisis and business continuity management services.
    • frequently-asked-questions-smallFAQ’s
    • bg-menu-government-institutionsConsultant Registration
  • Contact Us
Contact Us

Ransomware 101: The Anatomy of a Cyber-Attack

You are here: Home / General / Ransomware 101: The Anatomy of a Cyber-Attack

Recently, cyber-attacks reported in the news have made mention of a cyber-attack method called ‘Ransomware’. But why is a ransomware attack so feared?

The way that a ransomware attack works is that a threat actor will try and compromise a system, and if they are successful in gaining access to the system, the threat actor will then encrypt the system and send a notification to the owner of the system. This notification will advise that their system is locked, and cannot be unlocked unless a ransom is paid. If the target complies, they will be sent a decryption key to access their system or data that was held ransom.

The evolution of ransomware has been steady and increasing exponentially. There are two common methods threat actors use when deploying ransomware – opportunistic attacks and targeted attacks. The opportunistic approach utilises mass distribution of the ransomware online, hoping for a victim to get caught. The targeted attack includes gathering specific information about the target before wrapping up the customised gift basket and leaving it on their front door.

Initial compromise by ransomware, according to Cloudflare researchers, includes:

  1. An attacker compromising Remote Desktop Protocol (RDP) or Virtual Private Network (VPN) servers.
  2. An attacker exploiting unpatched vulnerabilities in a web application or server.
  3. Attackers using spear-phishing to gain a foothold in the targeted environment.

Damage from a ransomware attack

Without proper security infrastructure or protocol, attackers who have gained access to the system can leave behind them a devastating path of destruction. This is especially true when it’s a sophisticated group of hackers. One of the dangerous routes these hackers can take within the system is to identify the network infrastructure of the business. The larger the network, the heavier the impact of the ransomware. To make matters worse, these attackers can also install backdoors to the system, in case they need to access it again later, while also moving laterally to the system’s backup server and deleting those backups in order to retain backdoor access.

While the damage sounds horrifying to most businesses and government bodies, ransomware is showing no signs of slowing down. Ransom as a service (RaaS) models are starting to become popular, and soon inexperienced threat actors will be able to access and use them. Below are a few recommendations to help keep your oragnisation secure.

  • Use 2FA (two-factor authentication) as much as possible on your remote access entry points
  • Maintain multiple redundant backups of critical systems and data, onsite and offsite
  • Monitor and block malicious domains
  • Sandbox web browsing activity to isolate threats at the browser level

For more information about best industry practices and standards, please contact us.

Author: Saeed Baayoun

Tweet
Share

General,  Security News

Looking for a security partner? Get in touch with Agilient.

Looking for practical and cost-effective security and risk solutions for your government department, agency or company? Speak with Australia’s leading senior security, risk and resilience experts.


Looking for a pandemic planning partner? Get in touch with Agilient.

Looking for practical and cost-effective risk management solutions for your government department, agency or company? Speak with Australia’s leading senior risk and emergency management experts.



Footer

Agilient is a proud member of

Ai Group Defence Council
Australian Industry & Defence Network
Australian Security Industry Association
Sydney Aerospace & Defence Interest Group

Company and Licensing Details:

ABN: 37 157 911 441
NSW Security Master Licence # 410783087
ACT Security Master Licence # 17502184
Vic Security Registration # 878-460-40S
Qld Security Firm Licence # 3834422

Join The Tribe

Sign up to receive our regular Agilient newsletter including the latest security, risk and resilience updates

Sign up now

Copyright © 2025 Agilient – Level 14, 275 Alfred St, North Sydney NSW 2060 Australia – 1300 341 692

Our Services

Security Consultant

Security Consultant Sydney

Security Consultant Melbourne

Security Consultant Canberra
Security Consultant Perth

Security Consultant Adelaide

Security Consultant Brisbane