Decoy: fake order from a Taiwanese company. The xls attachment, if opened, contacts a link and redirects the victim to a malicious site, which downloads the malware.
The cybersecurity experts: The ransomware frequently changes obfuscation techniques, uses a custom Windows XP virtual machine and chooses which folders it will not encrypt.
Global malspam campaign with xlsm attachment. It contacts a link from an internal list and downloads a dll, which contains a trojan and backdoor-loader hybrid.
Fake mails from Reveue Agency come all from .casa domains. The attachment, different for each message, contains xlsb. It, if opened, contacts a DLL which starts malware infection.
Symantec cybersecurity experts: The Chinese state-sponsored group leverages living-off-the-land tools and custom malware, as Backdoor.Hartip, to spy victims.
Last trick to increase pressure on the ransomware victims is to print out the requests to all available printers. Cybersecurity experts believe the malware is the evolution of Maze.
The email contains a link that downloads a .doc attachment. This contacts a random url from an internal list of 9 and downloads a DLL, which starts malware infection.
The lure is a fake email on an email closure. It contains a link to update the account via a login page. Also this one is false. The only aim is to steal credentials.