Sourcecode: HelloKitty Ransomware
The HelloKitty ransomware group, like other ransomware gangs, implements a double extortion model, stealing sensitive documents from victims before encrypting them. Then, the threat actors threaten to leak the stolen data to force the victim into paying the ransom. The ransomware samples seem to evolve quickly and frequently, with different versions making use of the…

You must be logged in to post a comment.