Society ❯ Privacy ❯ Data Protection ❯ Identity Theft
The infostealer uses DLL sideloading through signed applications with decoy files before exfiltrating credentials via Telegram bots