The attack leverages the Log4Shell flaw to download an additional payload from a remote server that encrypts all the files with the extension “.khonsari” and demands a Bitcoin ransom payment.
Source: cyware.com
The attack leverages the Log4Shell flaw to download an additional payload from a remote server that encrypts all the files with the extension “.khonsari” and demands a Bitcoin ransom payment.
Source: cyware.com