Investigation Process
- Incident Reporting – Victims report to CERT-In or cyber police.
- Digital Forensics – Experts analyze system logs, ransomware signatures, and network traffic.
- Tracing Cryptocurrency Transactions – Law enforcement tracks ransom payments made in Bitcoin or other cryptocurrencies.
- Decryption Attempts – Cybersecurity teams attempt to break the encryption without paying ransom.
- International Collaboration – Agencies work with global cybersecurity firms to track attackers.