Remove Antivirus Remove Cybercrime Remove Data collection Remove Threat Reports
article thumbnail

Good game, well played: an overview of gaming-related cyberthreats in 2022

SecureList

Once executed on the attacked system, RedLine Stealer collects system information, including device user names, the operating system type, and information about the hardware, installed browsers, and antivirus solutions. Launching the malware resulted in decryption and activation of a Trojan-stealer dubbed Taurus.

Mobile 103