“After being deployed on selected targets, it searches the drives of compromised systems for interesting files and exfiltrates them to Google Drive. One unusual capability found in prior versions of ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results