See how threat actors have abused Remcos to collect sensitive information from victims and remotely control their computers to perform further malicious acts.