BOOK THIS SPACE FOR ADARTICLE AD
Ransomware identifies the drives on an infected system and begins to encrypt the files.
Ransomware generally adds an extension to the encrypted files, such as: .aaa, .micro, .encrypted, .ttt, .xyz, .zzz, .locky, .crypt, .cryptolocker, .vault, or .petya, to show that the files have been encrypted.
Once the ransomware has completed file encryption, it creates and displays a file containing instructions on how the victim can pay the ransom. If the victim pays the ransom, the threat actor may provide a key that the victim can use to unlock the files, and recover them.
WE DON’T RECOMMEND PAYING FOR THE RANSOM, IT IS REALLY POSSIBLE THAT THEY WON’T GIVE YOU THE KEY, AND EVEN WORST, THEY WILL EXTORSION YOU AND ASK YOU FOR MORE MONEY