When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.

Then, they would use these credentials to upload a document to one of these services.

However, depending on the documents privacy tweaks, security solutions may not be allowed to scan it.

A digital representation of a lock

Alternatively, the hackers would restrict access to the document only to designated recipients, to the same result.

To make matters worse - the threat actors are not distributing these files in the traditional phishing way.

ViaThe Hacker News

More from TechRadar Pro