In a novel approach to spear phishing, threat actors are using Windows screensaver files (.scr) to get past defender lines and compromise organizations. ReliaQuest Threat Research published research today detailing how attackers lured multiple users into running a Windows screensaver file, which installs a remote monitoring and management (RMM) tool, giving the attacker interactive remote control over the target’s operating system.
Relevant URL: https://www.darkreading.com/application-security/attackers-use-screensavers-drop-malware-rmm-tools