When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.

Initial access is most likely done through phishing, where crooks share loaders disguised asMicrosoftOffice files.

In other words, crooks can deploy different tools, depending on what they want from the victim.

Image of laptop infected with malware threat

I peggiori Malware del 2022

More from TechRadar Pro