Research Article
Automatically Traceback RDP-Based Targeted Ransomware Attacks
Figure 8
Of the 8,075 real ransomware samples, 11% were able to extract the Program Data Base (PDB) path, while the remaining 89% of authors may have chosen to hide the PDB path during compilation.