Answer the question
In order to leave comments, you need to log in
How does ransom malware work?
How is the disk encrypted, how does the virus get in, what is used for it, what to do when caught in the clutches of the extortionist?
Interested in everything from the stage how the virus got to the moment how to decrypt or restore data. Usually backups are on the same disk in small and medium-sized companies.
Answer the question
In order to leave comments, you need to log in
How it gets there is like any other virus. What to do when caught - conclusions so as not to get caught again. How to decrypt data - in general, no way, restore from backups. If there are no backups, forgive the data. "Backups are on the same disk" - only for idiots, this is not a backup, but a profanity.
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question