"\uB79C\uC12C\uC6E8\uC5B4"@ko . "\uB79C\uC12C\uC6E8\uC5B4 (Ransomware, \u30E9\u30F3\u30B5\u30E0\u30A6\u30A7\u30A2) \uB294 \uCEF4\uD4E8\uD130 \uBC14\uC774\uB7EC\uC2A4\uC758 \uC77C\uC885\uC73C\uB85C, \uAC10\uC5FC\uB41C \uCEF4\uD4E8\uD130\uC758 \uC811\uADFC\uACFC \uAE30\uB2A5\uC744 \uC81C\uD55C\uD55C \uB4A4\uC5D0 \uD574\uB2F9 \uC81C\uD55C\uC744 \uD480\uC5B4\uC8FC\uB294 \uB300\uAC00\uB85C \uD604\uAE08\uC774\uB098 \uBE44\uD2B8\uCF54\uC778 \uB4F1\uC744 \uC694\uAD6C\uD558\uB294 \uC545\uC131 \uD504\uB85C\uADF8\uB7A8\uC785\uB2C8\uB2E4."@ko . "\uB79C\uC12C\uC6E8\uC5B4 (Ransomware, \u30E9\u30F3\u30B5\u30E0\u30A6\u30A7\u30A2) \uB294 \uCEF4\uD4E8\uD130 \uBC14\uC774\uB7EC\uC2A4\uC758 \uC77C\uC885\uC73C\uB85C, \uAC10\uC5FC\uB41C \uCEF4\uD4E8\uD130\uC758 \uC811\uADFC\uACFC \uAE30\uB2A5\uC744 \uC81C\uD55C\uD55C \uB4A4\uC5D0 \uD574\uB2F9 \uC81C\uD55C\uC744 \uD480\uC5B4\uC8FC\uB294 \uB300\uAC00\uB85C \uD604\uAE08\uC774\uB098 \uBE44\uD2B8\uCF54\uC778 \uB4F1\uC744 \uC694\uAD6C\uD558\uB294 \uC545\uC131 \uD504\uB85C\uADF8\uB7A8\uC785\uB2C8\uB2E4."@ko . . .