When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.
For example, it will not communicate with its victims via Tor, but rather via email.
The joint advisory also urges organizations to keep their endpoints secure by following security best practices.
Image Credit: Shutterstock
Finally, companies are advised to educate their employees on the dangers of phishing and social engineering.