Symantec cybersecurity experts: The China-linked APT used unpatched vulnerabilities in Microsoft Exchange, the Sodamaster backdoor and other custom malware and tools.
Symantec cybersecurity experts: The Slug malware uses hijacked TCP communications to connect on networks with strict firewall rules for cyber espionage purpose.
Symantec cybersecurity experts: The MuddyWater APT (MERCURY, SeedWorm and TEMP.Zagros) used legitimate tools, publicly available malware, and living-off-the-land tactics.
Symantec cybersecurity experts: The Chinese state-sponsored group leverages living-off-the-land tools and custom malware, as Backdoor.Hartip, to spy victims.
Symantec cyber security experts spotted a ransomware campaign which exploits legitimate tools and both malware to earn big profits from large-multinational companies.
Yoroi-Cybaze Zlab cyber security experts: It has been designed to hit High-Value targets, and probably is still under development. It uses extensively obfuscation anti-reverse techniques.
Symantec cyber security experts: The malware is able to hide and reinstall itself, downloading other threats and display ads. It already infected 45,000 devices in past 6 months.
Cylance cyber security experts: Some contain code associated with the XMRig Monero CPU miner. Others included Metasploit. One loader use steganography to decode-execute PE file.