IT threat evolution Q1 2022
SecureList
MAY 27, 2022
The attackers are mainly interested in collecting data on user accounts, IP addresses and session information; and they steal configuration files from programs that work directly with cryptocurrency and may contain account credentials. The campaign has two goals: gathering information and stealing cryptocurrency. Other malware.
Let's personalize your content