A scammer gains access to a victim’s computer systems or private network, encrypts sensitive information or data, and demands a ransom from the victim to restore access to the encrypted information or data upon payment. The scammer will then provide detailed instructions on how to pay the fee to get the decryption key and may accept payment in crypto assets.