Consider the following statements about ransomware attacks:
Which of the statements given above are correct?