Malicious programs, such as blackmail Trojans, blackmail software, crypto or encryption Trojans, with the help of which an intruder can prevent the computer owner from accessing data, its use or the entire computer system. This involves encrypting data on the foreign computer or preventing access to it in order to demand a “ransom” for decryption or release.