CISA
The only real way to spot the malware is memory analysis. Organisations can get a disk image by opening a Cisco Technical Assistance Center (TAC) case. Good luck, y'all.
Month-long government shutdown is creating a headache for cyber security experts
"Users can define a series of modular steps—such as static file analysis, dynamic sandboxing, hash verification, unpacking, or signature detection"
Attacks on Krebs "should be publicly condemned by any American who believes in the Constitution"
"We anticipate multiple impacts to CVE, including deterioration of national vulnerability databases and advisories, tool vendors, incident response operations, and all manner of critical infrastructure"