Malware is still under development with two more variants (v2.a and v2.b) spotted in the wild and doesn’t yet appear to be a complex attacking framework based upon the details researcher shared. The Ramsay samples they found do not have a network-based C&C communication protocol, nor does any attempt to connect to a remote host for communication purposes. The future versions of the Ramsay malware could have an implication to connect with a remote attacker-controlled server for receiving commands and exfiltrating data.
Source: https://thehackernews.com/2020/05/airgap-network-malware.html

