Two critical-severity ShareFile vulnerabilities allow remote attackers to bypass authentication and execute arbitrary code.
"The C2 hosts a web-based graphical user interface (GUI) titled 'NEXUS Listener' that can be used to view stolen information ...