Advisory 2020-008: Copy-Paste ... - ACSC | Cyber.gov.au

The ACSC has identified the use of PowerShell scripts to conduct malicious activity on compromised systems. Examples of the actor’s use of PowerShell include: A PowerShell reverse shell payload used in conjunction with Telerik UI exploitation (see Appendix D – PowerShell Reverse Shell). ................
................