From there on, communications with the end-user is done via TOR or similar technologies. Once the ransom is paid – often via Bitcoin to avoid any traces to the attacker – the private key is delivered …
More How To Deal With Ransomware In A Zero Trust World Videos