Good game, well played: an overview of gaming-related cyberthreats in 2022
SecureList
SEPTEMBER 6, 2022
Once executed on the attacked system, RedLine Stealer collects system information, including device user names, the operating system type, and information about the hardware, installed browsers, and antivirus solutions. Launching the malware resulted in decryption and activation of a Trojan-stealer dubbed Taurus.
Let's personalize your content