HOW RANSOMWARE GROUPS ACT - ISH Tecnologia