Trick 5-Malicious Software Deployment
Ransomware is disguised as legitimate software or updates and is unknowingly installed by users.
How it Works:
- Hackers modify genuine software by embedding ransomware into its installer.
- They distribute it via fake websites, torrents, or unofficial app stores.
- Users download and install what they believe to be a safe program.
- Once executed, the ransomware encrypts files and locks the system.
- Attackers demand a ransom, often threatening to leak stolen data if unpaid.
Ransomware Attack on Haldiram’s (2021)

Details:
- Hackers infiltrated Haldiram’s IT network by disguising ransomware as legitimate software.
- The ransomware encrypted financial records and employee data, locking the company out.
- Attackers threatened to leak confidential business data if the ransom wasn’t paid.
Haldiram’s cybersecurity team worked with experts to restore the system without paying ransom.