Additionally, there are no further system modifications made beyond the file encryption and ransom note drop. These characteristics are designed to avoid detection in target systems. The HellCat and ...