Fluffy Wolf sends out reconciliation reports to sneak into corporate infrastructures

Fluffy Wolf sends out reconciliation reports to sneak into corporate infrastructures

The group has adopted a simple yet effective approach to gain initial access: phishing emails with an executable attachment. This way, Fluffy Wolf establishes remote access, steals credentials, or exploits the compromised infrastructure for mining