Attackers deploy a legitimate, digitally signed hardware driver to delete security software from machines before encrypting files. …read more

Source:: DarkReading