No installs required: history search, redirection, job control, completions, and other built-in terminal features that exploit the power of Linux.
Forcepoint researchers describe a layered attack chain that slips past filters by mimicking everyday business behavior.