
Gremlin Stealer Uses Encrypted Resources to Store Exfiltration Paths
Threat actors are constantly upgrading their malware to evade detection, and the latest variant of the Gremlin stealer demonstrates a significant leap in sophistication. This evolving threat now uses a commercial packing utility that transforms its original code into custom bytecode, making it highly evasive. Gremlin primarily targets compromised systems to siphon sensitive information, such […]
The post Gremlin Stealer Uses Encrypted Resources to Store Exfiltration Paths appeared first on Cyber Security News.