HawkEye Keylogger Users Employ Hacked Emails Accounts to Receive Stolen Data

HawkEye Keylogger Users Employ Hacked Emails Accounts to Receive Stolen Data

They also leverage RTF exploits to infect users