The cybersecurity experts: The malware doesn’t contain a long-winded ransom note and uses email for communication. It encypts files with .mouse extention.
The emails contain an xlsm attachment which, if opened, contacts a random link from an internal list and downloads a DLL. This starts the malware infection.
A doc file is downloaded from the link in the email which, if opened, activates the ransomware infection chain. This,can exfiltrate the data as well as encrypt it.
The company: It is remotely exploitable without authentication, letting remote attacker to take control of an affected system. Patch the CVE-2020-14750 now!
New malspam campaign: the xlsm attachment, if opened, contacts a random link from an internal list and downloads the DLL that starts the malware infection.
The project, created by cybersecurity expert Luca Mella, has already found that the phenomenon is transversal. It affects big and small companies. Even in sectors not at "cyber risk".