An active email campaign is reportedly targeting banking and financial services employees in the US and UK using popular cloud services to host the malicious payload, according to a blog posted today by Menlo Security.
The campaign targets endpoints, including PCs, and attackers are reportedly using two types of payloads – VBScripts and JAR files – to compromise the endpoints. In looking at the victims who have clicked on malicious links to archive files, researchers found that all files were either ZIP or GZ.
By Kacy Zurkus
To read the full article click here.