I got a call from a customer yesterday who had what appeared to be a corrupt database. They're running a version of my application that uses an Access database. Access databases are prone to corruption, and over the past 20 years I've built up an extensive bag of tricks for repairing them. But this one did not appear to be an Access database at all, but rather an encrypted file. It was the right size, but contained no plain text. Plain text would comprise the bulk of a normal database's contents, even one that's been corrupted. There was nothing in the file header to suggest it was, say, a zip or rar, an encrypted Access file, or any other common file type.
I just heard back from the customer this morning and they've received a ransom email, demanding money to get their files back. This is a new one to me!
I've asked them to forward the email to me, but I haven't seen it yet. It supposedly contains a link to a website, so it'll be interesting to see where these creeps are located. Don't worry, I won't open the email, just examine the source.
Hopefully, they've been diligent with their backups, but it could still be months before they identify every file that's been corrupted.