Good reason your IT Team should lock down and harden Powershell such as enabling logging, restricting it’s internet access, preventing who can use it, etc.
“...A user receives a typical spam email ... clicks the link ... website then loads Flash which opens Windows PowerShell in memory ... PowerShell downloads and executes a script ... PowerShell locates and sends the user’s data to the attacker...”
No comments:
Post a Comment