This paper presents a comprehensive simulation of
a ransomware attack designed for educational and awareness
purposes. The simulation follows the structure of a real-life
cyberattack and is guided by the cyber kill chain framework. It
replicates critical stages including delivery—via USB-based and
email spoofing methods—exploitation, persistence, command-
and-control communication, and impact through file encryption
and psychological pressure tactics. While some initial stages
such as reconnaissance are simplified, the simulation provides a
realistic and resolvable representation of ransomware behavior in
mid-to-late attack phases. By evaluating various delivery methods
and obfuscation techniques, this study enhances understanding of
ransomware threats and supports the development of defensive
strategies in a controlled environment. The findings highlight
significant gaps in current detection mechanisms and emphasize
the importance of proactive cybersecurity education.
