Cybercrime, IcedID banking Trojan is evolved with substantial changes
IBM cyber security experts: The malware spread via malspam with Office attachments. Files boobytrapped with malicious macros that launch infection routine, fetch and run the payload.