Juniper Threat Labs cybersecurity experts: the malware uses GitHub and Pastebin for housing component code and has at least 12 different attack modules available.
The bait is the usual invoice, theoretically contained in the compressed attachment. Inside there is an exe file which, when opened, triggers the infection of the malware.
The cybersecurity experts: The malware doesn’t contain a long-winded ransom note and uses email for communication. It encypts files with .mouse extention.
The company: It is remotely exploitable without authentication, letting remote attacker to take control of an affected system. Patch the CVE-2020-14750 now!
The project, created by cybersecurity expert Luca Mella, has already found that the phenomenon is transversal. It affects big and small companies. Even in sectors not at "cyber risk".
US CISA, FBI, and CNMF cybersecurity experts: APT employs common social engineering tactics, spearphishing, and watering hole attacks to exfiltrate information.