[[{“value”:”What makes Mimic particularly unusual is that it exploits the API of a legitimate Windows file search tool (“Everything” by Voidtools) to quickly locate files for encryption.
Find out more about the threat in my article on the Tripwire State of Security blog.”}]]