When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.

The campaign starts on illegal streaming sites where people can watch pirated content.

), exfiltrate it to a server under the attackers control, while deploying the second-stage payload.

Pirate skull cyber attack digital technology flag cyber on on computer CPU in background. Darknet and cybercrime banner cyberattack and espionage concept illustration.

Infostealers in action

The second-stage payload depends on the compromised gadget.

Thismalwarecan grab peoples login credentials, cryptocurrency information, banking details, and more.

However, malware was also hosted on Dropbox and Discord.