The trojan originates from a .exe file type, that would spread right through the user's USB Drive and infect data on the USB, or Desktop. It would then encrypt the data of the user's device and only decrypt it when the user answers a question correctly, functioning like a ransomware program.
Graph IRI | Count |
---|---|
http://dbkwik.webdatacommons.org | 103 |