Glossary

What is Ransomware?

Ransomware is malware that encrypts a victim's files or locks them out of their systems, then demands payment — typically in cryptocurrency — in exchange for the decryption key or restored access.

Also known as: ransomware attack, crypto-ransomware

Ransomware has evolved from opportunistic attacks on individuals to a sophisticated criminal industry targeting enterprises, hospitals, and government agencies. Modern ransomware operations often follow a "double extortion" model: attackers first exfiltrate sensitive data, then encrypt the victim's systems. If the victim refuses to pay for decryption, the attackers threaten to publish the stolen data. Some groups have added a third layer, launching DDoS attacks during negotiations.

The initial infection vector is typically phishing emails, compromised credentials, or exploitation of unpatched vulnerabilities in internet-facing services. Once inside, attackers move laterally through the network, escalate privileges, disable backups, and deploy the ransomware payload simultaneously across as many systems as possible. The encryption used by ransomware is genuine — without the attacker's key, recovery is often impossible.

Defense requires a comprehensive approach: regular patched systems, network segmentation, immutable backups stored offline, endpoint detection, least-privilege access, and incident response planning. Reducing the volume of sensitive data stored persistently — particularly credentials and secrets in emails, documents, and chat logs — limits both the leverage attackers have for extortion and the damage from data exfiltration.

How Vaulted uses Ransomware

Vaulted reduces the sensitive data available to ransomware operators who exfiltrate data before encrypting systems. Secrets shared through Vaulted are ephemeral — they self-destruct after a limited number of views and automatically expire. Unlike passwords stored in emails or shared documents that persist indefinitely and become high-value targets during data exfiltration, Vaulted links leave no recoverable plaintext on the server. The zero-knowledge architecture means even a compromised server yields only encrypted blobs that attackers cannot decrypt.