When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.
We also approach victims we discover on-chain," ZachXBT toldBleepingComputer.
you could think of those as encrypted folders where all the passwords are stored.
That doesnt mean that the attackers cant try and brute-force their way in, using specialized hardware and software.
And thats exactly what the researchers suspect the attackers did.
ViaBleepingComputer