The threat actors targeting Albanian organizations with ransomware and wiper malware have updated portions of their malware delivery operations.
In both the first and second wave of attacks the ransomware uses a code signing certificate, which was most likely stolen from a Kuwait Telecommunications Company.
In early deployments, the wiper malware and raw disk driver made use of a signed third-party loader, a signed loader for unsigned drivers, to deploy the raw disk driver and obtain access the raw disk on the machine.
However, in the second wave, the threat actors made use of a leaked Nvidia code signing certificate to sign the wiper malware which now has the modified raw disk driver embedded into the signed payload.