Good game, well played: an overview of gaming-related cyberthreats in 2022
SecureList
SEPTEMBER 6, 2022
Once executed on the attacked system, RedLine Stealer collects system information, including device user names, the operating system type, and information about the hardware, installed browsers, and antivirus solutions. Trojan-PSW.Win32.Convagent Convagent and Trojan-PSW.Win32.Stealer
Let's personalize your content