This piece of malware surfaced in the last quarter when Microsoft’s researchers noticed that it requires additional tools and components during deployment. It starts with a pen-testing/attack server that searches for potentially vulnerable networks to exploit, but the result is the same as with other ransomware: user’s files end up encrypted.
Created: 2026-02-23
Indicatorsは見つかっていない。
このPulseに見つかったCVEはありません。