{"id":26746,"date":"2022-04-25T12:08:00","date_gmt":"2022-04-25T10:08:00","guid":{"rendered":"https:\/\/perseus.de\/ransomware\/"},"modified":"2026-03-30T11:05:58","modified_gmt":"2026-03-30T09:05:58","slug":"ransomware","status":"publish","type":"post","link":"https:\/\/perseus.de\/en\/ransomware\/","title":{"rendered":"Ransomware"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"26746\" class=\"elementor elementor-26746 elementor-22443\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cab3f18 e-flex e-con-boxed e-con e-parent\" data-id=\"cab3f18\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2a02b8b e-con-full e-flex e-con e-child\" data-id=\"2a02b8b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4f80ded elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"4f80ded\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Ransomware\n<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d061a7 elementor-widget elementor-widget-image\" data-id=\"2d061a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png\" class=\"attachment-medium size-medium wp-image-25801\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-150x150.png 150w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-768x768.png 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png 800w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-18be9f6e e-flex e-con-boxed e-con e-parent\" data-id=\"18be9f6e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-68bb7bff e-con-full e-flex e-con e-child\" data-id=\"68bb7bff\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e839854 elementor-widget elementor-widget-text-editor\" data-id=\"e839854\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<header class=\"Single__header Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size6D\"><div class=\"Share\"><div class=\"Module Text Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size8T\"><div class=\"Module Text Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size8T\"><div class=\"Module Text Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size8T\"><div><p>Refers to extortionate <a href=\"https:\/\/perseus.de\/2022\/04\/26\/schadprogramme-malware\/\">malware<\/a>. Cybercriminals use ransomware to make files, hard drives, computers or entire networks inaccessible to their legitimate users and demand a ransom to release the files, etc. The term is made up of the English words &#8220;ransom&#8221; for ransom and &#8220;-ware&#8221; as a word part of software, i.e. program.  <\/p><h4> <\/h4><h4>What does ransomware mean in detail?<\/h4><p>Ransomware attacks are currently on the rise. Cybercriminals have identified companies, authorities and administrations as worthwhile targets for themselves. Increasingly, complex, individualized attacks on companies are being observed. Cybercriminals take a targeted and often multi-stage approach. With seemingly everyday <a href=\"https:\/\/perseus.de\/2022\/04\/19\/cybervorfall\/\">cyber incidents<\/a> such as <a href=\"https:\/\/perseus.de\/2022\/04\/26\/spam\/\">spam<\/a> , they gain access to the corporate network. Then they research the IT infrastructure in order to encrypt particularly important or sensitive data in a targeted manner \u2013 or the entire system, including connected <a href=\"https:\/\/perseus.de\/2022\/04\/19\/backup\/\">backups<\/a>. This approach allows the extortionists to exert greater pressure on the affected companies and demand higher ransoms. Paying the ransom is the desired endpoint of the cybercriminals&#8217; activities.<br>Whether they release the encrypted data or systems afterwards is therefore always uncertain. Some ransomware programs don&#8217;t have any intended decryption, which means that the data remains encrypted even after a ransom payment is made.<br>In the case of the well-known WannaCry ransomware, ransom payments could not be assigned due to a programming error. As a result, no corresponding decryption of the data took place.<br>A second, higher ransom demand can also be part of the cybercriminals&#8217; concept.<br>Technically, ransomware is <a href=\"http:\/\/52.57.197.213\/2022\/04\/26\/trojaner\/\">a Trojan.<\/a> Ransomware can be transmitted in several ways, including via infected email attachments, compromised websites, infected USB sticks and hard drives, network security vulnerabilities, and <a href=\"https:\/\/perseus.de\/2022\/04\/19\/drive-by-malware\/\">drive-by<\/a> downloads.          <\/p><h3> <\/h3><h4>Where do I encounter the topic of &#8220;ransomware&#8221; in my everyday work?<\/h4><p>Potentially, you will encounter it with every email with an attachment, with every email with a link and in many other places in your everyday work. For example, in the case of seemingly lost or forgotten USB sticks, when transferring data to customers&#8217; external hard drives, when downloading a supposedly important <a href=\"http:\/\/52.57.197.213\/2022\/04\/26\/update\/\">update<\/a> to be able to watch a video on the Internet. In all these places, you can keep great damage away from your company with your prudence.  <\/p><h3> <\/h3><h4>What can I do to improve my security?<\/h4><p>Within the framework of this glossary, we can only provide suggestions and insights. Please discuss and create a comprehensive procedure with your IT department or with an external IT security service provider such as Perseus. <\/p><p><strong> <\/strong><\/p><p><strong>Preventive<\/strong><\/p><p>Nearly all measures to reduce your organization&#8217;s <a href=\"https:\/\/perseus.de\/2022\/04\/19\/cyberrisiko\/\">cyber risk<\/a> also reduce the risk of ransomware attacks. These measures include, but are not limited to: <\/p><ul><li>Always keep all programs and components of the network up to date, e.g. through automatic updates<\/li><li>Use of a reliable, always up-to-date virus scanner<\/li><li>Consider the use of a reliable <a href=\"https:\/\/perseus.de\/2022\/04\/20\/firewall\/\">firewall<\/a><\/li><li>Well thought-out network structure, in which, for example, particularly sensitive areas or departments receive an independent network<\/li><li>Traffic monitoring<\/li><li><a href=\"https:\/\/perseus.de\/2022\/04\/22\/mitarbeitenden-sensibilisierung\/\">Sensitization of your employees<\/a>: Through their attention and prudence, your employees can avert damage even where technology cannot. For example, you can detect and treat an email with a previously unknown Trojan as suspicious. <\/li><li>When taking security measures, also consider <a href=\"https:\/\/perseus.de\/2022\/04\/26\/schatten-it\/\">so-called shadow IT<\/a> (e.g. also privately used employee smartphones) and <a href=\"https:\/\/perseus.de\/2022\/04\/21\/internet-of-things-iot\/\">IoT<\/a> devices (e.g. fitness trackers, digital surveillance cameras).<\/li><li>A well-thought-out backup strategy is also recommended. This ensures that you can recover as much of your data as possible, even in the worst case. When it comes to ransomware, some things you should consider include:  <ul><li>Backups connected to the system can also be encrypted by ransomeware. Therefore, frequent backups are recommended, which are also physically disconnected from the system after creation. <\/li><li>A ransomware that is not yet active can also be stored on your backup and encrypt it after it has been installed. Therefore, make sure that as many previous backups as possible are stored. Also make sure that they are saved in &#8220;read only&#8221; mode. Then these backups can no longer be changed afterwards, not even by ransomware. Discuss the right course of action in an acute case with your IT department or with an external IT security service provider such as Perseus.    <\/li><li>Practice it \u2013 also with your employees \u2013 and write it down. In acute cases, it is important to react quickly and correctly, and you can create the best conditions for this by taking preventive measures.  <\/li><\/ul><\/li><\/ul><p><strong> <\/strong><\/p><p><strong>After a seemingly &#8220;normal&#8221; cyber incident<\/strong><\/p><ul><li>Have your system carefully checked for deeper compromises and arrange for particularly close monitoring of incoming and outgoing data traffic<\/li><li>If you haven&#8217;t already, discuss the topic of ransomware and security measures with your IT department and\/or an external IT security service provider such as Perseus now.<\/li><\/ul><p><strong> <\/strong><\/p><p><strong>In acute cases<\/strong><\/p><p>ATTENTION: These instructions are general. In acute cases, stick to the procedure discussed with your IT department or with an external IT security service provider such as Perseus. Only this is tailored to your company-specific IT infrastructure!  <\/p><ul><li>Disconnect the affected device or system from the network, the Internet, and power as soon as possible. With luck, you can stop the encryption process before it is completed. Do not be deterred, not even by messages to the contrary on the screen of an infected computer.  <\/li><li>Not all devices can be disconnected from the power supply, e.g. laptops or tablets with built-in batteries. If possible, remove them. If not, shut down the device as soon as possible.  <\/li><li>Alert experts for further action.<\/li><li>Usually, backups are now created of the infected systems. On the one hand as a digital forensic record and on the other hand a lot of encrypted data can be restored. <\/li><li>Report this cyber incident to the police, the BKA and the Reporting Office for Cyber Security in Germany. This can help to catch the perpetrators and warn other companies. <\/li><li>Don&#8217;t pay a ransom. There is no guarantee that your device or system will be decrypted afterwards, and in some cases, this possibility is not even provided for in the ransomware&#8217;s program. There&#8217;s even a chance that you&#8217;ll face a second ransom note after making a payment. Furthermore, it is possible that the cybercriminals compromise the payment method and means of payment and thus obtain sensitive credit card information, for example.   <\/li><\/ul><p>Further information and tips for acute cases from the Police Crime Prevention:<a href=\"https:\/\/www.polizei-beratung.de\/themen-und-tipps\/gefahren-im-internet\/ransomware\/\">https:\/\/www.polizei-beratung.de\/themen-und-tipps\/gefahren-im-internet\/ransomware\/<\/a><\/p><\/div><\/div><\/div><\/div><section class=\"Module BlogLatest Background Background--darkBlackBlue\"><div class=\"container\"> <\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/header>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cb1ddf2 e-flex e-con-boxed e-con e-parent\" data-id=\"cb1ddf2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Ransomware Refers to extortionate malware. Cybercriminals use ransomware to make files, hard drives, computers or entire networks inaccessible to their legitimate users and demand a ransom to release the files, etc. The term is made up of the English words &#8220;ransom&#8221; for ransom and &#8220;-ware&#8221; as a word part of software, i.e. program. What does [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[57],"tags":[],"class_list":["post-26746","post","type-post","status-publish","format-standard","hentry","category-cyber-glossary"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ransomware - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/en\/ransomware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"Ransomware Refers to extortionate malware. Cybercriminals use ransomware to make files, hard drives, computers or entire networks inaccessible to their legitimate users and demand a ransom to release the files, etc. The term is made up of the English words &#8220;ransom&#8221; for ransom and &#8220;-ware&#8221; as a word part of software, i.e. program. What does [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/en\/ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-25T10:08:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-30T09:05:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/ransomware\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/ransomware\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"Ransomware\",\"datePublished\":\"2022-04-25T10:08:00+00:00\",\"dateModified\":\"2026-03-30T09:05:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/ransomware\\\/\"},\"wordCount\":1058,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/ransomware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"articleSection\":[\"Cyber Glossary\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/ransomware\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/ransomware\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/ransomware\\\/\",\"name\":\"Ransomware - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/ransomware\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/ransomware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"datePublished\":\"2022-04-25T10:08:00+00:00\",\"dateModified\":\"2026-03-30T09:05:58+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/ransomware\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/ransomware\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/ransomware\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/ransomware\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/en\/ransomware\/","og_locale":"en_US","og_type":"article","og_title":"Ransomware - Perseus Technologies","og_description":"Ransomware Refers to extortionate malware. Cybercriminals use ransomware to make files, hard drives, computers or entire networks inaccessible to their legitimate users and demand a ransom to release the files, etc. The term is made up of the English words &#8220;ransom&#8221; for ransom and &#8220;-ware&#8221; as a word part of software, i.e. program. What does [&hellip;]","og_url":"https:\/\/perseus.de\/en\/ransomware\/","og_site_name":"Perseus Technologies","article_published_time":"2022-04-25T10:08:00+00:00","article_modified_time":"2026-03-30T09:05:58+00:00","og_image":[{"width":800,"height":800,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png","type":"image\/png"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Xenia Silbe","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/en\/ransomware\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/en\/ransomware\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"Ransomware","datePublished":"2022-04-25T10:08:00+00:00","dateModified":"2026-03-30T09:05:58+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/en\/ransomware\/"},"wordCount":1058,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/en\/ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","articleSection":["Cyber Glossary"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/en\/ransomware\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/en\/ransomware\/","url":"https:\/\/perseus.de\/en\/ransomware\/","name":"Ransomware - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/en\/ransomware\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/en\/ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","datePublished":"2022-04-25T10:08:00+00:00","dateModified":"2026-03-30T09:05:58+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/en\/ransomware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/en\/ransomware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/en\/ransomware\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/en\/ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Ransomware"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/en\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/26746","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/comments?post=26746"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/26746\/revisions"}],"predecessor-version":[{"id":26747,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/26746\/revisions\/26747"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/media?parent=26746"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/categories?post=26746"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/tags?post=26746"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}