It took the malware 10 hours to fully infect one target’s network. 1
It also uses some unorthodox cryptographic practices that aren’t “semantically secure,” because patterns of the original files remain after they’re encrypted. 1
The malware also appears to have taken hold of one victim through a chance infection of its virtual private network. 1

TL;DR as a service

Highlight the Internet and share on social media