Government ❯ Cybersecurity Policy ❯ Threat Assessment ❯ International Cybercrime
The infostealer uses DLL sideloading through signed applications with decoy files before exfiltrating credentials via Telegram bots