In response to a query for more details, Proofpoint said the message “leveraged the trusted relationship between the compromised sender and the targets by using a business-to-business sales lure”, including an order form and a backgrounder on the company. The… Read More "Polyglot files used to spread new backdoor"
