Example of an Integrity Attack: Ransomware Deletion Scheme
An organized group of hackers has either sent out phishing emails, or set up fake websites, awaiting an unsuspecting victim of a financial institution to click the link.
Once the link is clicked, malware is downloaded to the system and attempts to infect other systems on the network.
At some point, the malware begins encrypting data on the infected machines -- and subsequently deletes or writes over the existing information on the infected network.