Water Curse Employs 76 GitHub Accounts to Deliver Multi-Stage Malware Campaign

Cybersecurity researchers have exposed a previously unknown threat actor known as Water Curse that relies on weaponized GitHub repositories to deliver multi-stage malware.
“The malware enables data exfiltration (including credentials, browser data, and session tokens), remote access, and long-term persistence on infected systems,” Trend Micro researchers Jovit Samaniego, Aira Marcelo, Mohamed

Total
0
Shares
Leave a Reply

Your email address will not be published. Required fields are marked *

Previous Post

Ex-CIA Analyst Sentenced to 37 Months for Leaking Top Secret National Defense Documents

Next Post

FedRAMP at Startup Speed: Lessons Learned

Related Posts
Total
0
Share