Ransomware

Ransomware

Resources to inform decision-making and provide effective strategies to protect your organization from ransomware attacks.

A man staring blankly at a laptop that is infected with ransomeware

RANSOMWARE fundamentals

Understand the basics of ransomware

After evolving for decades, ransomware attacks are a force to be reckoned with in the world of cybercrime. Get to know how ransomware works, why, and the latest trends.

A woman sitting at here computer learning about ransomeware

Industry Report

2024 Ransomware Report

Learn more about why ransomware attacks increased 17.8% year-over-year, alongside the largest known ransom payout of all time.

Resource

The 4 Stages of a Ransomware Attack

VPNs and firewalls can’t stop every stage of a ransomware attack. For that, you need a zero trust architecture.

Zpedia

What Is Phishing?

As the leading cause of ransomware infections, phishing exploits something most people rely on: the assumption of trust.

Zpedia

What Is Lateral Movement?

From a single infected device, ransomware can spread to an entire network as it searches for data to encrypt or steal.

PREVENTION & PROTECTION

Hone your ransomware protection approach

Ransomware is becoming more frequent, more damaging, and more public. Understand the effective strategies to protect your users and data.

Products & Solutions

Stop Ransomware Attacks with a Zero Trust Architecture

Deploy smarter, proactive defenses: Eliminate the attack surface, prevent compromise, stop lateral movement, and block data exfiltration with zero trust.

Resource

5 Steps to Stop Ransomware with Zero Trust

Evaluate and strengthen your ransomware defense strategy with these handy checklists.

blog post

Mitigating the Rising Tide of Malware and Ransomware

Fighting ransomware is about effective preparation. Learn about key strategies, best practices, and essential tools.

Zscaler Academy

Ransomware Protection for Network and Security Engineers

Get trained and certified in the most effective approaches and tools for ransomware prevention and response.

RANSOMWARE IN THE NEWS

Stay up to date on the biggest ransomware attacks

Ransomware is always in the headlines as attacks break records worldwide year after year, showcasing the breakneck pace of their evolution.

A man looking at a computer reading the news about ransomware

blog post

7 Ransomware Predictions for 2025

In the coming year, GenAI-driven tactics and higher ransom demands will make effective ransomware prevention more critical than ever. See our full 2025 predictions.

Blog post

WannaCry five years on: Revisiting my revelation

Traditionally, users on the corporate network are considered the safest from cyberattacks. In 2017, WannaCry proved that wrong.

Blog Post

Shining Light on the Dark Angels Ransomware Group

In 2024, Dark Angels successfully extorted a US$75 million ransom—the largest known ransom payout of all time.

Blog Post

CDK’s Decision Not to File with the SEC

CDK Global’s decision raises tough questions about the effects of the SEC’s “material incident” disclosure rules.

RANSOMWARE & SPECIFIC SECTORS

Take a tailored approach to stop ransomware

Your industry’s unique landscape of data, systems, procedures, and regulations will shape your ideal ransomware defense strategy.

Tools

Calculate Your Ransomware Risk and Potential Cost Savings

Understand your exposure to threat actors' popular techniques and exploits with this free, non-invasive assessment, in just a few seconds.

blog post

Ignoring the Change Healthcare Attack Invites a Cycle of Disaster

Legacy technology, limited resources, and an array of IoT/IoMT devices make healthcare a prime target for ransomware.

Resource

Defending Government Against Ransomware

To effectively fight ransomware, agencies must ensure only the right users and devices can access the right apps and data.

(opens in a new tab)

Resource

Ransomware Attacks on the Gaming Industry

The gaming industry is a treasure trove of customer data and transaction details, and ransomware actors are doubling down.

Blog post

5 Key Takeaways: Ransomware in Healthcare, Education, and Public Sector

Sensitive data, outdated systems, and critical services are all the invitation attackers need.

TOOLS & SOLUTIONS

Find the right tools to fight ransomware

With sophisticated ransomware attacks on the rise, it’s critical to understand your risk and arm your organization with effective solutions.

a man standing in front of a board with various charts discussing how to protect against ransomware

Tools

Ransomware Risk Assessment

See how your security measures up against ransomware-specific intrusion, lateral movement, and exfiltration methods.

Products & Solutions

Zero Trust Device Segmentation

Eliminate the risk of lateral movement in your network by agentlessly isolating every endpoint into a secure “network of one.”

Resource

Automated Ransomware Kill Switch

Lock down known vulnerable protocols and ports, and instantly disable access to critical networks like hospital or factory floors.

Products & Solutions

Stop Unknown Attacks in Seconds

Stop file-based ransomware in its tracks with inline, AI-powered sandbox quarantine of unknown or suspicious files.

FAMOUS VARIANTS & TYPES

Know what you’re up against

Ransomware is in fashion among today’s threat actors, and like any trend, it has its big names, innovators, and subversive thinkers.

A man seated at a desk, focusing on the critical aspects of new ransomware types

blog post

Why Cybercriminals Are Turning to Encryption-Less Ransomware

Savvy threat actors are rewriting the ransomware playbook, foregoing encryption to make it faster and easier for victims to open their wallets.

Zpedia

What Is Double Extortion Ransomware?

Should bad actors seeking ransoms encrypt their victims’ data, or exfiltrate it and threaten to leak it? Why not both?

blog post

Technical Analysis of Trigona Ransomware

Read our in-depth examination of this idiosyncratic double extortion ransomware.

Blog Post

Technical Analysis of CryptNet Ransomware

Get our full take on this sophisticated ransomware-as-a-service (RaaS) variant.

Blog Post

A Retrospective on AvosLocker

Explore the key lessons to be learned from the activities of this dormant ransomware-as-a-service group.

TOOLS FOR CIOS, CTOS, & CISOS

Lead with insight to stop ransomware

As a leader, informed decisions are your most powerful tool in protecting your organization from data breaches, financial loss, and operational disruption.

Three individuals collaborate on a laptop, exploring strategies to protect against ransomeware with tools

Industry Report

Phishing and Ransomware Insights for the C-Suite

Get a C-level perspective on new ransomware variants, double extortion attacks, emerging tactics and techniques, and global stats.

Article

Get the Full Picture with the Executive Insights App

Get curated insights about your organization’s security and risk posture, ensuring you’re always ready to lead with confidence.