pull down to refresh

The attack methodology involved a particularly sophisticated approach. Attackers inserted a base64-encoded payload into an install script
I don’t think obfuscating malicious code by encoding it as base64 is "particularly sophisticated". They mentioned that in my graduate program.