Technology ❯ Software ❯ Malicious Software ❯ Impersonation
Security researchers say takedowns with published IoCs have not halted the campaign.