Novel Razr ransomware distributed via PythonAnywhere exploitation

Operations of Razr ransomware commence with unique machine ID, encryption key, and Initialization Vector generation, which are later delivered in unencrypted JSON format to a command-and-control server.

Article Link: Novel Razr ransomware distributed via PythonAnywhere exploitation | SC Media