The email contains an xlsm attachment. This, if opened, contacts a random link from an internal list from to download a DLL, which starts the malware infection.
They are HawkEye, Matiex and Agent Tesla, hidden in a .7z file. It contains four exe, disguised as pdf. Probably it’s an email attachment on a fake shipping.
Juniper Threat Labs cybersecurity experts: the malware uses GitHub and Pastebin for housing component code and has at least 12 different attack modules available.
The bait is the usual invoice, theoretically contained in the compressed attachment. Inside there is an exe file which, when opened, triggers the infection of the malware.
The cybersecurity experts: The malware doesn’t contain a long-winded ransom note and uses email for communication. It encypts files with .mouse extention.
The emails contain an xlsm attachment which, if opened, contacts a random link from an internal list and downloads a DLL. This starts the malware infection.
A doc file is downloaded from the link in the email which, if opened, activates the ransomware infection chain. This,can exfiltrate the data as well as encrypt it.
The company: It is remotely exploitable without authentication, letting remote attacker to take control of an affected system. Patch the CVE-2020-14750 now!