Akamai cybersecurity experts: It’s written in golang and and utilizes its built-in concurrency features to maximize spreadability and execute malware modules.
Guardicore cybersecurity experts: The malware uses indiscriminate port scanning and exploitation of exposed SMB services with weak passwords and hashes.
Juniper Threat Labs cybersecurity experts: the malware uses GitHub and Pastebin for housing component code and has at least 12 different attack modules available.
The lure is a fake CV attached in a mail. If the victim opens it, it asks to install the reader. Meanwhile Meanwhile, a JS activates the malware infection chain.
US accuses Tehran of using the space program as an excuse to develop military ballistics. In addition, the country in recent days has suffered a mysterious cyber offensive.
Guardicore Labs cyber security experts: Only in August the malware infected over 90,000 machines worldwide. It exploits brute force and EternalBlue for cryptomining.