In order to profit effectively from a ransomware attack, a threat actor needs to have something to offer in return for payment. This blog posts outlines a process, along with some python scripts to encrypt AWS resources and then revoke access to the secret material until the ransom is paid.