The attack uses a legitimate remote access system as well as several families of malware. …read more

Source:: DarkReading