Today > | 2 Medium | 1 Low vulnerabilities - You can now download lists of IOCs here!
1 attack reports | 0 vulnerabilities
The report describes a malicious campaign where threat actors utilize cloud services like Google Drive, OneDrive, and Dropbox to distribute malware and collect user information. The attack process starts with a malicious shortcut file (LNK) that executes PowerShell scripts to download decoy documen…