The incident story
Ransomware attackers typically hack into a system and lock it down threatening to destroy the stored data or leak confidential information into the public. The access to systems is denied until a ransom is transferred to the account of the attackers.
Post-attack efforts
In the official statement:
Publisher