We encountered a unique variant of the ClickFix malware technique. The catch? The user is social engineered into running a PowerShell script which downloads no files, makes no web requests, and embeds no payload.
Regardless, it's still able to install a malicious loader to maintain a foothold on the infected system. Check out my latest blog post to find out more:
https://expel.com/blog/cache-smuggling-when-a-picture-isnt-a-thousand-words/