Gremlin Stealer Stores C2 URLs and Exfiltration Paths in Encrypted Resource Sections
Source: Cybersecuritynews
Published:
<p>A newly analyzed variant of the Gremlin stealer malware has raised alarms by hiding its command-and-control (C2) addresses and data exfiltration paths inside encrypted resource sections of a compiled program. This approach makes the malware harder to detect through traditional scanning, allowing