According to bobfreedman in post #49, they have the decryption keys and are waiting for the decryption process to complete. But that assumes a couple of things:
1. The decryption works without issue and important files weren't corrupted in the process
2. The hackers haven't added any backdoors or embedded any other hacks
A forensic analysis of the restored machines will be necessary to double check everything. Thiat takes time. Presumably at thst point each AH needs to review they're own setup.
I hope a that point we get full transparency about what personal data was exposed.
__________________
Working on the following sets: 1916 and 1917 Zeenut, 1954B, 1955B, 1971T and 1972T
|