Simulation of protection against ransomware

Is it possible for any malware to add corrupted data to the existing repository to make confusion for Restic to restore data.