http://www.w3.org/ns/prov#value | - Once on a victim???s PC, Critroni encrypts a variety of files, including photos and documents, and then displays a dialogue box that informs the user of the infection and demands a payment in Bitcoins in order to decrypt the files.???It uses C2 hidden in the Tor network.
|