Infostealer Malware FormBook Spread via Phishing Campaign – Part II

Learn how the FormBook payload operates on a compromised machine, including the complicated anti-analysis techniques employed by this variant.

      

This article has been indexed from Fortinet Threat Research Blog

Read the original article: