This article doesn't at all explain what actually happens. There's a hand wavey description including PowerShell scripts and the clipboard, but it doesn't indicate how the code gets executed.
The article talks about a complex and sophisticated attack, but I don't see any evidence of that assertion.
Also, given that it's talking about PowerShell, I'm going to guess that this affects Windows only.
Finally, there's no source links, no CVE allocation, no indication what the URL looks like.
I'm going with deep scepticism about this report unless more information comes to hand.