RansomEXX Trojan attacks Linux systems
Technical description Fragment of the file encryption procedure pseudocode; variable and function names are saved in the debug information and must match the original source code Original names of source files embedded in the trojan’s body Execution log of the
Back
Read News