A legitimate-looking PDF or Word document to distract the user while the infection runs in the background.
Outbound traffic to unfamiliar IP addresses or domains associated with known APT (Advanced Persistent Threat) groups. 🛑 Recommended Actions
Check for unauthorized login attempts on your email and professional accounts.