Network administrators should refer to the indicators of compromise (IOCs), update firewalls promptly, and block malicious relay stations.
It is recommended to pay attention to suspicious emails, verify the correctness of the sender's address, and avoid opening emails and attachments from unknown sources.
Install antivirus software and update to the latest virus definitions. Before opening a file, use antivirus software to scan the email attachment, and verify the file type. Remain vigilant if unusual characters are found in the file name (such as the reverse sorting of executable file extensions like lnk, rcs, exe, moc).
Strengthen internal awareness campaigns to enhance personnel's cybersecurity awareness and prevent hackers from using email for social engineering attacks.