According to researchers at GreatHorn, a sophisticated attack is leveraging the ability to evade detection with the use of a rapidly changing Trojan attack pattern.

The research team identified what it called a widespread Trojan pattern that uses multiple different subject lines, email content, email addresses, display name spoofs and destination URLs to disguise itself as a confirmation on a paid invoice.

Read the full article on the InfoSecurity Magazine’s website