Gremlin Stealer Uses Encrypted Resources to Store Exfiltration Paths