Gremlin Stealer Stores C2 URLs and Exfiltration Paths in Encrypted Resource Sections

A newly analyzed variant of the Gremlin stealer malware has raised alarms by hiding its command-and-control (C2) addresses and data exfiltration paths inside encrypted resource sections of a compiled program. This approach makes the malware harder to detect through traditional scanning, allowing it to operate silently on infected systems before stealing sensitive data. Gremlin stealer […]

The post Gremlin Stealer Stores C2 URLs and Exfiltration Paths in Encrypted Resource Sections appeared first on Cyber Security News.

This article has been indexed from Cyber Security News

Read the original article: