Simple technique enables attackers to leverage Windows OS component to maintain stealth and persistence post system compromise.
Source: Threadpost