The new Coyote trojan variant attack uses a LNK file to execute a PowerShell command, which helps retrieve a PowerShell script for launching the trojan. This trojan obtains system details and an antivirus product list while attempting to bypass sandbox discovery, says a Fortinet FortiGuard Labs study.

SpyCloud Data Shows Corporate Users 3x More Likely to Be Targeted by Phishing Than by Malware – Security Boulevard
SpyCloud Data Shows Corporate Users 3x More Likely to Be Targeted by Phishing Than by Malware Security Boulevard


