where data, machine/s, service/s, or some other asset is held hostage in some way, where the ransomware will offer the asset back for some remuneration. The asset being hold hostage can mean some data was encrypted, some sensitive data has been exfiltrated, or the asset will not continue to run after the fact.

IoCs

Defences