Cryptolaemus cybersecurity experts detect that Epoch 4 and 5 began spamming again. Malware infections passes by direct attached XLS files and zipped-password protected XLS.
Akamai cybersecurity experts: It’s written in golang and and utilizes its built-in concurrency features to maximize spreadability and execute malware modules.
Microsoft cybersecurity experts: The botnet exploits unpatched vulnerabilities in the Spring Framework and WordPress plugins to infect systems with mining malware.