This Trojan is like a thief who hides behind your back and loots your belongings after you open your safe locker. With some smart social engineering thrown in, this malice spreads faster and wider in targeted groups. |
Trust was built in the first step. Then, in the second step, they asked for confidential information. |