Research Article

Automatically Traceback RDP-Based Targeted Ransomware Attacks

Figure 8

Of the 8,075 real ransomware samples, 11% were able to extract the Program Data Base (PDB) path, while the remaining 89% of authors may have chosen to hide the PDB path during compilation.