When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.
The campaign starts on illegal streaming sites where people can watch pirated content.
), exfiltrate it to a server under the attackers control, while deploying the second-stage payload.
Infostealers in action
The second-stage payload depends on the compromised gadget.
Thismalwarecan grab peoples login credentials, cryptocurrency information, banking details, and more.
However, malware was also hosted on Dropbox and Discord.