An inside look at how ransomware groups go stealth | SC Media
Ransomware operators count on e-mail vendors who you should not maintain logs and utilize code obfuscation, anti-evaluation techniques, and third-bash anonymizing systems to go over their tracks.