@jedisct1 “Essentially the malware will generate a new AES 256 key for each file it is going to encrypt.” http://www.bleepingcomputer.com/forums/t/506924/cryptolocker-hijack-program/page-5#entry3153406 …
-
-
-
@RATBORG Sure. Now: how is this key generated? What mode of operation is being used? How is the IV generated (if it's not static)?
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.