Crime ❯ Cybercrime ❯ Espionage
Credential Theft
The campaign hijacks a dormant .NET scheduled task for covert persistence by blending legitimate proxies to evade detection