The cybersecurity expert Maddie Stone: It used “watering hole” attacks to redirect specific targets to a pair of exploit servers delivering malware on Windows, iOS, and Android.
The cybersecurity experts: Customers will automatically mitigate CVE-2021-26855 on any server on which it is deployed. However, it’s not a replacement for the patch.
Palo Alto Networks cybersecurity experts: The malware uses AES-256 and RSA-2048 to encrypt files, and the ransom note includes 2 email addresses to contact for pay.
The cybersecurity experts: The malware doesn’t contain a long-winded ransom note and uses email for communication. It encypts files with .mouse extention.
Check Point cyber security experts: The Windows crypto miner and DDOS hybrid malware now is multi-platform and multi-architecture, targeting Linux and IoT devices.
Netscout cyber security experts: The cryptojacking and DDoS malware includes additional tools and a port to the operating system. The bot supports TCP, UCP, ICMP, and HTTP-based attacks.
Eclypsium: It’s a vulnerability in the GRUB2 bootloader, that hit devices using Secure Boot. Attackers can install persistent and stealthy bootkits or malware.