Microsoft cybersecurity experts: The malware doesn’t encrypt the files. It blocks access to device by displaying a screen with the ransom note that appears over every other window.
Kaspersky cybersecurity experts: To evade detection, it host its communications with the C2 on public cloud services and hides the main malware with steganography.
The lure is a fake CV attached in a mail. If the victim opens it, it asks to install the reader. Meanwhile Meanwhile, a JS activates the malware infection chain.
CISA-MS-ISAC cyber security experts: Roughly 16,000 alerts related to the malware and significant increase in state-local governments targeted by the malware with phishing.
ESET cybersecurity experts: The targets are primarily government entities. The APT, until now undetected, exploits the XDDown malware and spear phishing.
The email contains a compressed attachment with an HTML Help File hidden inside. This, if performed, downloads a fake image that activates the malware infection.
Cisco Talos cybersecurity experts: The 1.1.1 malware added a Powershell keylogger and a VB script. The 1.1.7 update removed them, focusing on stealing passwords and cookies from browsers.