Crypto-ransomware is among the extremely prevalent malware cyberattacks worldwide. it is typically spread using phishing emails and compromised websites, where crypto-ransomware is downloaded stealthily after luring users to click on malicious links. Additionally, attackers may take advantage of available vulnerabilities in software installed on the victim's device or use a zero-day vulnerability in the operating system. Crypto-ransomware employs encryption techniques against users' data and resources, rendering them inaccessible and demanding a cryptocurrency ransom for decryption. Crypto-ransomware attacks have witnessed massive growth within the past few years, resulting in massive financial loss across the globe. Different detection and prevention techniques have been proposed to overcome crypto-ransomware attacks, and many tools have been implemented. In this work the authors present a summary of the most recently used techniques and tools, highlighting different employed strategies that address crypto-ransomware attacks in the different stages of the attack chain.