Author: Catalin Cimpanu / Source: BleepingComputer
Author: Alvaro Hoyos / Source: Information Security Buzz
Author: Tim Gutwald / Source: Miller Johnson