Having evolved from a basic premise of locking down a victim’s data with encryption, then demanding a ransom for its release, ...