The concept of file encrypting ransomware was invented and implemented by Young and
Columbia University and was presented at the 1996 IEEE Security & Privacy conference. It is called cryptoviral extortion and it was inspired by the fictional facehugger in the movie
 Cryptoviral extortion is the following three-round protocol carried out between the attacker and the victim.
- [attacker→victim] The attacker generates a key pair and places the corresponding public key in the malware. The malware is released.
- [victim→attacker] To carry out the cryptoviral extortion attack, the malware generates a random symmetric key and encrypts the victim's data with it. It uses the public key in the malware to encrypt the symmetric key. This is known as
hybrid encryption and it results in a small asymmetric ciphertext as well as the symmetric ciphertext of the victim's data. It zeroizes the symmetric key and the original plaintext data to prevent recovery. It puts up a message to the user that includes the asymmetric ciphertext and how to pay the ransom. The victim sends the asymmetric ciphertext and e-money to the attacker.
- [attacker→victim] The attacker receives the payment, deciphers the asymmetric ciphertext with the attacker's private key, and sends the symmetric key to the victim. The victim deciphers the encrypted data with the needed symmetric key thereby completing the cryptovirology attack.
The symmetric key is randomly generated and will not assist other victims. At no point is the attacker's private key exposed to victims and the victim need only send a very small ciphertext (the encrypted symmetric-cipher key) to the attacker.
Ransomware attacks are typically carried out using a
Trojan, entering a system through, for example, a downloaded file or a vulnerability in a network service. The program then runs a
payload, which locks the system in some fashion, or claims to lock the system but does not (e.g., a
scareware program). Payloads may display a fake warning purportedly by an entity such as a
law enforcement agency, falsely claiming that the system has been used for illegal activities, contains content such as
Some payloads consist simply of an application designed to lock or restrict the system until payment is made, typically by setting the
Windows Shell to itself,
 or even modifying the
master boot record and/or
partition table to prevent the operating system from booting until it is repaired.
 The most sophisticated payloads
encrypt files, with many using
strong encryption to
encrypt the victim's files in such a way that only the malware author has the needed decryption key.
Payment is virtually always the goal, and the victim is coerced into paying for the ransomware to be removed—which may or may not actually occur—either by supplying a program that can decrypt the files, or by sending an unlock code that undoes the payload's changes. A key element in making ransomware work for the attacker is a convenient payment system that is hard to trace. A range of such payment methods have been used, including
premium-rate text messages,
voucher services such as
 and the
 A 2016 survey commissioned by
Citrix claimed that larger businesses are holding bitcoin as contingency plans.