![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrh5jHgqAdcerE_kHHScnqd4v5Xz70RsnDXtsaCt1_jbqlogH0wLFMT7BGzZN7DsIcyX8Ir8BKGJw_Os9XlWqLcpMvrCdWfmDqg9iuc_ocB-Jk7K7WMj7eGZ2mZfhQCc_m-hKQvftpaByY7yz1AMq6Wt3Bm60O3cwiEDYxeyHLe9jVgPyUxp39tasB8WA/s1600/winscp.jpg)
Threat actors associated with the BlackCat ransomware have been observed employing malvertising tricks to distribute rogue installers of the WinSCP file transfer application.
“Malicious actors used malvertising to distribute a piece of malware via cloned webpages of legitimate organizations,” Trend Micro researchers said in an analysis published last week. “In this case, the distribution
Source:: The Hackers News