Good game, well played: an overview of gaming-related cyberthreats in 2022
SecureList
SEPTEMBER 6, 2022
Its main stealer functionality involves extracting data such as passwords, cookies, card details, and autofill data from browsers, cryptocurrency wallet secrets, credentials for VPN services, etc. The stolen information is then sent to a remote C&C server controlled by the attackers, who later drain victims’ accounts.
Let's personalize your content