Gremlin Stealer Hides C2 and Exfiltration Paths in Encrypted Resources

A newly identified variant of the Gremlin stealer malware is leveraging advanced obfuscation techniques to conceal its command-and-control (C2) infrastructure and data exfiltration logic within encrypted .NET resource sections. This evolution highlights a significant shift toward stealth, modularity, and anti-analysis sophistication in modern infostealer campaigns. Its targets include browser-stored credentials, session tokens, cryptocurrency wallets, clipboard […]

The post Gremlin Stealer Hides C2 and Exfiltration Paths in Encrypted Resources appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.