Gootkit PowerPoint Technique

While many of today’s malware sport relatively new capabilities, most of their authors or operators still use old techniques to deliver them. Malicious macros and shortcut (LNK) files are still used in ransomware, banking Trojans, and targeted attacks, for instance. These methods may be tried-and-tested, but we’re also seeing distinctive or otherwise overlooked techniques—such as the abuse of legitimate tools like PowerShell, or using malformed subtitle files to remotely take over a device.