When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.
This tool handles different parts of theoperating system, and can create custom views of commonly accessed tools.
However, the researchers are saying it could also be used to run other commands, as well.
Who the attackers are, or how they usually deliver these MSC files to their victims was not discussed.
Now, since most of these methods are no longer as effective, hackers came up with something new.
ViaBleepingComputer