Full Decryption of Systems Encrypted by Petya/NotPetya
As demonstrated in the previous blog post about decryption of Petya/NotPetya, almost the complete Master File Table (MFT) can be decrypted. In…
As demonstrated in the previous blog post about decryption of Petya/NotPetya, almost the complete Master File Table (MFT) can be decrypted. In…
Making the world a better place has always been a core goal of CrowdStrike. In this blog post, we are making our…