Banking trojan executes when targets hover over link in PowerPoint doc
Found on Ars Technica on Friday, 09 June 2017

The method—which was used in a recent spam campaign that attempted to install a bank-fraud backdoor alternately known as Zusy, OTLARD, and Gootkit—is notable because it didn't rely on macros, visual basic scripts, or JavaScript to deliver its payload.
Instead, the delivery technique made use of the Windows PowerShell tool, which was invoked when targets hovered over a booby-trapped hyperlink embedded in the attached PowerPoint document.
Why on earth would you even consider to directly link dubious content against a shell?