A malware delivery campaign detailed by Blackpoint researchers employs an impressive array of tricks to deliver an infostealer to employees without triggering enterprise defenses or close examination by security researchers. The attackers aim to get the Amatera Stealer installed on target Windows computers by using fake human verification pages – i.e., CAPTCHA pages – to trick users into manually pasting and executing a command via the Run dialog. And here is where things get interesting. … More
The post Attackers use Windows App-V scripts to slip infostealer past enterprise defenses appeared first on Help Net Security.
This article has been indexed from Help Net Security
Read the original article: