This document summarizes malware activity from 2016-2018, including the Jaff and Necurs botnets, WannaCry and Petya ransomware worms, and the emerging VPNFilter botnet. It describes their payloads and infection methods, such as exploiting the EternalBlue SMB vulnerability and using Mimikatz to extract credentials. The document also discusses techniques used by cybercriminals, such as hiding on bullet proof hosting, using anonymous tools and cryptocurrency, and targeting Ukraine for attacks. It provides recommendations like patching SMB vulnerabilities, disabling unnecessary ports, and submitting samples to analysis services.