At every turn, the info-stealer uses legitimate services to get around normal email, endpoint and network defenses.
Source: Threadpost