Advisory 2020-008: Copy-Paste ... - ACSC | Cyber.gov.au

The ACSC identified the use of batch files which the actor typically placed a number of individual commands to be run, as opposed to complex scripts. Examples of commands run in this fashion were ping, echo and net use. ................
................