# Ransomware **MITRE ATTACK layer: Impact** Ransomware is a type of malware that encrypts files or systems and demands payment in exchange for restoring access. ## How is Ransomware abused Attackers gain initial access through phishing, credential abuse, or unpatched vulnerabilities, then spread laterally, disable backups, exfiltrate data, and deploy encryption payloads. ## Why Ransomware matters Ransomware can halt business operations, cause significant financial loss, expose sensitive data, and damage organizational trust, often requiring lengthy recovery efforts even after payment. ## Real-world example ### Possible Ransomware-Linked Data Leak at Nike Nike announced it is investigating a potential data breach after a known ransomware group claimed to have leaked about 1.4 TB of internal business data online. While the company did not confirm ransom demands or the breach’s full scope, the incident highlights that even major global brands are at risk of ransomware-linked data exposure. [Source](https://www.reuters.com/sustainability/boards-policy-regulation/nike-says-it-is-investigating-possible-data-breach-2026-01-26/?utm_source=chatgpt.com) ## Related topics ### Malware [Read more](https://www.manageengine.com/products/desktop-central/attack-glossary/malware.html) ### Command and Control Attack [Read more](https://www.manageengine.com/products/desktop-central/attack-glossary/command-and-control-attack.html) ### Insider Threat [Read more](https://www.manageengine.com/products/desktop-central/attack-glossary/insider-threat.html) ## Additional Resources ### Achieve 442% ROI and reduce patching time by 95% — Forrester TEI Report See how organizations gained 442% ROI and major efficiency improvements with Endpoint Central. [Read more](https://www.manageengine.com/products/desktop-central/forrester-total-economic-impact-uems.html?utm_source=ec-attackglossary) ### Experience enterprise-grade protection proven in real-world tests — AV-Comparatives Report Discover how Endpoint Central’s antivirus earned recognition through rigorous, real-world security validation in just eight months. [Read more](https://www.manageengine.com/products/desktop-central/malware-protection-av-comparatives-dec2025.html?utm_source=ec-attack_glossary) ### Simplify endpoint security and build cyber resilience — Endpoint Security For Dummies Get a clear, practical guide to understanding threats and strengthening your organization’s security. [Read more](https://www.manageengine.com/products/desktop-central/endpoint-security-for-dummies.html?utm_source=ec_attack-glossary)