How does the illustration spread? Can it be decrypted? One image takes you through ten typical ransomware families Source: Guangming Network