Today > vulnerabilities - You can now download lists of IOCs here!
1 attack reports | 0 vulnerabilities
An analysis reveals that threat actors have developed custom malware based on the open-source SapphireStealer to harvest credentials from employees of Russian companies. The malicious operation involves deploying a modified version of the stealer malware, specifically tailored to target organizatio…