Good game, well played: an overview of gaming-related cyberthreats in 2022
SecureList
SEPTEMBER 6, 2022
Once executed on the attacked system, RedLine Stealer collects system information, including device user names, the operating system type, and information about the hardware, installed browsers, and antivirus solutions. The scheme encourages users to log in using their social media credentials.
Let's personalize your content