Ma Baker
Additional Info
Description
One of your clients has been the victim of a ransomware attack. From the preliminary testing performed by your team, the ransomware targets only docx files on linux systems. Your client has shared with you an archive with some of the files they would like to recover.
Write-ups
Other artefacts
Tasks
See if you can recover any of the files.
Proof: The flag located in any of the unencrypted docx files.