Researchers said the malware has been under development for at least three years. The attack involves spear-phishing emails with malicious Word documents to gain initial access. The malware is built to steal information and provide consistent access to the victim. Researchers said it can take screenshots, manipulate files (including creating, deleting, renaming and reading them), gather information on the top-level windows that are open, and shut down the computer. Check Point has attributed the campaign to a Chinese APT, such as Tick, Tonto Team and TA428.
Source: https://threatpost.com/victory-backdoor-apt-campaign/166700/