Back

Gremlin Stealer Stores C2 URLs and Exfiltration Paths in Encrypted Resource Sections

Source: Cybersecuritynews

Published:

<p>A newly analyzed variant of the Gremlin stealer malware has raised alarms by hiding its command-and-control (C2) addresses and data exfiltration paths inside encrypted resource sections of a compiled program. This approach makes the malware harder to detect through traditional scanning, allowing

Read original article

Loading article...

Article not found