The malicious platform has also improved its persistence and stealth, and now exploits cloud for data theft. Its ransom notes ...