A zip attachment contains a img with an exe: the malware. The other, a pdf downloading a zip with an exe: the same malware. The data is exfiltrated via SMTP.
WordPress, critical vulnerability in Fancy Product Designer under active attack

A critical vulnerability in WordPress’s Fancy Product Designer is under active attack. Wordfence cybersecurity experts: The developer just released a patched version of the plugin, install it now!
A critical vulnerability in WordPress’s Fancy Product Designer has been under active attack and is exploitable in some configurations, even if the plugin has been deactivated. It has been denounced by Wordfence cybersecurity experts, who underlined that the developer just released a patched version of the plugin. Fancy Product Designer offers the ability for customers to upload images and PDF files to be added to products. Unfortunately, while the plugin had some checks in place to prevent malicious files from being uploaded, these were insufficient and could easily be bypassed, allowing attackers to upload executable PHP files to any site with the plugin installed. This effectively made it possible for any attacker to achieve Remote Code Execution on an impacted site, allowing full site takeover.