Cyberthreats to financial organizations in 2022
SecureList
NOVEMBER 23, 2021
This ransomware is controlled by command line parameters and can either retrieve an encryption key from the C2 or an argument at launch time. If not ransomware, then DDoS or possibly both. Botnet operators use infected devices to carry out DDoS attacks or mine cryptocurrency. Extortion on the rise.
Let's personalize your content