The campaign heavily uses Dropbox folders and PowerShell scripts to evade detection and quickly scrapped infrastructure components after researchers began poking around.
Go to Source
Author: Robert Lemos, Contributing Writer
Go to Source
Author: Robert Lemos, Contributing Writer