Today > vulnerabilities - You can now download lists of IOCs here!
1 attack reports | 0 vulnerabilities
This intelligence report details a unique social engineering technique observed by Proofpoint researchers, leveraging users to copy and paste malicious PowerShell scripts to infect their computers. The threat actors TA571 and ClearFake activity cluster employ this method to deliver malware like Dar…