Fingerprint
it would be interesting to see how this "new WINDOWS BASED malware " will fingerprint the *nix based system and decide "which" cve to exploit ,considering there are multiple *nix vendors ?.
Sounds like another method /vector to attack the hypervisor host,not exactly new if you look at the large citrix clients base servering up web applications and the flow of cve's for this area,although more arm based issues than x86.
It makes my heart bleed and i'am shell shocked by these new discoveries!.
Serve those patches up! with no desert.