This code hijacks the host, host.ics files and make to access the phishing site set by the hacker. File vanishes after executed..
This code hijacks the host, host.ics files and make to access the phishing site set by the hacker. File vanishes after executed..