Updated, July 24: This article has been updated with further information on the encryption method used by the ransomware and other details of the ransomware itself, as well as a proof-of-concept for decrypting affected files if the password used can be recovered or brute-forced. Attackers will sometimes use the name of security companies in their […] Contact us today for more information about SOPHOS cyber security solutions