When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.
Then, they would use these credentials to upload a document to one of these services.
However, depending on the documents privacy tweaks, security solutions may not be allowed to scan it.
Alternatively, the hackers would restrict access to the document only to designated recipients, to the same result.
To make matters worse - the threat actors are not distributing these files in the traditional phishing way.
ViaThe Hacker News