Once a computer is infected with crypto-malware, how is the software controlled by the attacker?

Group of answer choices

The software monitors the victim's email for instructions via encoded messages.

The software connects to a command and control server to receive instructions or updates.

The software receives instructions via encrypted tunneled traffic from distributed sources.

The attacker connects to the computer remotely using ports opened by the malware.

1 answer

The correct answer is:

The software connects to a command and control server to receive instructions or updates.

In many cases of crypto-malware (or ransomware), the infected system typically communicates with a central command and control (C&C) server that the attacker controls. This C&C server can send updates or further instructions to the malware, including encryption keys or additional payloads.