OpenSSL TLS DTLS Heartbeat Information Disclosure (CVE-2014-0160, CVE-2014-0346).
Previously in action
Last month, the malware operators were found spreading the infection via malspam campaigns, including malicious .doc files.
In June 2020, authors of Valak added a new clientgrabber plugin, which could perform the task of stealing email credentials from the registry of the compromised system.
In the same month, a Valak campaign was found using document files that contacted PHP delivery proxies to pull down and execute the initial DLL payload.
Conclusion
Cybercriminals are regularly updating their malware with new abilities and features to stay ahead in their game. Therefore, experts recommend deploying anti-malware solutions to prevent and stop such malware. In addition to this, users should stay alert while opening emails or clicking on links.