Powershell has extremely powerful capabilities and is built-in to modern versions of Windows. Penetration testers and red teams have been using Powershell to pillage networks for years now, but it is not often talked about how malware authors are abusing Powershell in real attacks. This talk examines several cases of Powershell malware seen in the wild and looks at what we can expect in the future. Recommendations will also be given on how to defend against Powershell attacks.