By tapping the unusual .scr file type, attackers leverage executables that don’t always receive executable-level controls, one researcher noted.
First seen on darkreading.com
Jump to article: www.darkreading.com/application-security/attackers-use-screensavers-drop-malware-rmm-tools
![]()

