From cyware.com
![Attackers execute NETWIRE backdoor trojan using a process hollowing technique](https://cyware.com/smart/unsafe/785x390/smart/filters:quality(80)/https://cystory-images.s3.amazonaws.com/shutterstock_248596786.jpg)
- The Process Hollowing technique involves the use of VBScript, PowerShell, and the .NET framework.
- The capabilities of the NETWIRE trojan includes keylogging, reverse shell, and password theft.
Researchers have come across a new phishing campaign in which attackers targeted multiple customers by using a