Trend Micro research shows how attackers use platforms like YouTube to spread fake installers via trusted hosting services, employing encryption to evade detection and steal sensitive browser data. Author: AlienVault
Related Tags:
hashes
domains
ioc
revil
cyber threats
c2 servers
MARSSTEALER
RUGMI
Sodinokibi
Associated Indicators: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