CRIGENT malware

CRIGENT malware uses TOR & Windows Powershell to infect victims

TrendMicro has released a new report which reveals the methods the CRIGENT malware used to operate.

The malware researchers from Trendmicro explained that the CRIGENT malware used the TOR networks to stay hidden and that it used the Windows Powershell function to install and spread malicious codes.