All product names, logos, and brands are property of their respective owners. This offers an opportunity for experts to advertise. Identify system and operational dependencies.
Accordingly, the exploit was not developed entirely by criminal groups. Rather, the actual code with which the vulnerability was exploited comes from Immunity, which has been offering it for some time as part of its canvas (https://soyoungsodesign.com/serial-code/?file=6696) tools for penetration tests. The version that has now emerged, which is out in the wild, is probably a cracked variant of this exploit, which can now also be used independently of the Immunity (browse around this website) product. The cracked versions should have been available in some closed Telegram groups since last October.