diff --git a/monkey/infection_monkey/ransomware/consts.py b/monkey/infection_monkey/ransomware/consts.py index 8ff02fe99..4010c01da 100644 --- a/monkey/infection_monkey/ransomware/consts.py +++ b/monkey/infection_monkey/ransomware/consts.py @@ -2,4 +2,4 @@ from pathlib import Path README_SRC = Path(__file__).parent / "ransomware_readme.txt" README_FILE_NAME = "README.txt" -README_SHA256_HASH = "e3d9343cbcce6097c83044327b00ead14b6e8e6aa0d411160610033a856032fc" +README_SHA256_HASH = "a5608df1d9dbdbb489838f9aaa33b06b6cd8702799ff843b4b1704519541e674" diff --git a/monkey/infection_monkey/ransomware/ransomware_readme.txt b/monkey/infection_monkey/ransomware/ransomware_readme.txt index 8a4627a6b..e3131c465 100644 --- a/monkey/infection_monkey/ransomware/ransomware_readme.txt +++ b/monkey/infection_monkey/ransomware/ransomware_readme.txt @@ -38,10 +38,11 @@ .-. yN//Ny .-. :dmmd: +This is NOT a real ransomware attack. + Infection Monkey is an open-source breach and attack simulation (BAS) platform. The files in this -directory have been manipulated as part of a ransomware simulation. This is NOT a real ransomware -attack. If you've discovered this file and are unsure about how to proceed, please contact your -administrator. +directory have been manipulated as part of a ransomware simulation. If you've discovered this file +and are unsure about how to proceed, please contact your administrator. For more information about Infection Monkey, see https://www.guardicore.com/infectionmonkey.