3 Comments

good article. Finally there is any possibility to find out the encryption key and then decrypt the files ?

Reply

Can you expound on the portion of the malware that is responsible for uploading the user’s data to the attacker or is it simply an empty threat at the end of their .txt instructions file?

Reply

Leave a Reply

Your email address will not be published.