Business ❯ Cybersecurity ❯ Threat Intelligence ❯ Data Breaches
The infostealer uses DLL sideloading through signed applications with decoy files before exfiltrating credentials via Telegram bots