Cado cybersecurity experts: Written in Golang, it runs a crypto-mining software. It uses newer address resolution techniques for C2 traffic to evade detection.
AT&T Alien Labs cybersecurity experts: The campaign exploits multiple shell/batch scripts, new open source tools, a cryptominer, and the group IRC bot.
Check Point cyber security experts: The Windows crypto miner and DDOS hybrid malware now is multi-platform and multi-architecture, targeting Linux and IoT devices.
Sophos cyber security experts: The malware, a cryptominer, infects the victim and tries to spread. For the attack it uses the EternalBlue exploit and an implementation of Mimikatz.
The Cyber Security Experts: The attackers used CVE-2020-11651 and CVE-2020-11652 to install backdoors and cryptominers. More than 6,000 devices could be compromised.
Guardicore Labs cyber security experts: Only in August the malware infected over 90,000 machines worldwide. It exploits brute force and EternalBlue for cryptomining.