Ransomware Attack

Identifying the Attack

Prev Question Next Question

Question

Ann, a customer, is reporting that several important files are missing from her workstation.

She recently received communication from an unknown party who is requesting funds to restore the files.

Which of the following attacks has occurred?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

A.

The attack that has occurred in this scenario is most likely ransomware, which is option A.

Ransomware is a type of malware that encrypts or locks important files on a computer or network, making them inaccessible to the owner. The attacker then demands payment, usually in the form of cryptocurrency, in exchange for the decryption key or password to unlock the files.

In this scenario, Ann's important files have gone missing, and she has received communication from an unknown party requesting funds to restore them. This is a classic indication of a ransomware attack.

Option B, keylogger, is a type of malware that records every keystroke made on a computer or device, allowing the attacker to steal sensitive information such as passwords, credit card numbers, and other personal data.

Option C, buffer overflow, is a type of cyber attack where an attacker sends more data than a program or system can handle, causing it to crash or become vulnerable to further exploits. It is not related to the scenario described.

Option D, rootkit, is a type of malware that allows an attacker to gain remote access and control over a computer or network, without being detected by traditional security measures. While a rootkit could potentially be used to facilitate a ransomware attack, it is not directly related to the scenario described.

Therefore, the most likely attack that has occurred in this scenario is ransomware, as the attacker is demanding payment in exchange for restoring Ann's missing files.