Today > vulnerabilities - You can now download lists of IOCs here!
1 attack reports | 0 vulnerabilities
A recent phishing campaign has been observed delivering Formbook stealers through email attachments. The malware uses multiple stages and steganography to hide malicious files inside images. The infection chain involves three stages before the final payload: Purchase Order.exe, Arthur.dll, and Mont…