Malware encryption processing

chicchi

Level 1
Thread author
Jul 23, 2017
9
Hi, Although I am interested,
When malware performs encryption processing,
1. Communicate with C & C server
2. Encrypt the file

Do you know who is doing cryptographic processing elsewhere?
If I do not know I can only sleep a little.
 
  • Like
Reactions: Daljeet

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top