Previously limited to initial access brokering, the Gootloader group has pivoted to a nasty post-compromise “GootBot” attack, each implant with its own C2.
Go to Source
Author: Becky Bracken, Editor, Dark Reading
Cyber Security Expert
Go to Source
Author: Becky Bracken, Editor, Dark Reading