New research reveals that a new ACRStealer variant is now being actively deployed as a final payload by HijackLoader, using low‑level syscalls, AFD-based networking, TLS C2, and flexible secondary payload delivery to evade detection and maximize data theft. The newly observed samples confirm that HijackLoader is dropping a rebranded ACRStealer variant previously linked to the […]
The post ACRStealer Variant Deploys Syscall Evasion, TLS C2, Secondary Payloads appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
This article has been indexed from GBHackers Security | #1 Globally Trusted Cyber Security News Platform
Read the original article: