Ursnif Trojan Uses New Malicious Macro Tactics


The normal infection chain when malicious macros are used involves tricking the victim into enabling the macro in the document received via spam email. Next, malicious code (usually PowerShell) is executed to download and run the final payload.

Read full news article on SecurityWeek