Recent content by td1947

  1. T

    Petya Ransomware: What It Is, Who's Behind It, How to Stop It

    No, according to the article, it uses a second module that encrypts files if the MBR attack fails.