TOPransom

Pierluigi Paganini August 01, 2017
TOPransom: From eMail Attachment to Powning the Attacker’s Database

TOPransom – Analyzing the entire process from getting an email attachment to powning the ransom server trying to stop the infection. Hi folks, today I want to share a quick but intensive experience in fighting cybercrime. I wish you would appreciate the entire process of getting an email attachment to powning the ransom server trying […]