The researchers believe that the attackers are not targeting specific individuals or groups but are rather casting a wide net to infect as many users as possible. They also anticipate that the attackers may impersonate other software in the future to carry out their malicious activities.
