URL has been copied successfully!
LummaC2 Stealer Leverages Customized Control Flow Indirection For Execution
URL has been copied successfully!

Collecting Cyber-News from over 60 sources

LummaC2 Stealer Leverages Customized Control Flow Indirection For Execution

The LummaC2 obfuscator employs a novel control flow protection scheme designed specifically for its stealer component, which is part of a broader set …

First seen on gbhackers.com

Jump to article: gbhackers.com/lummac2-stealer-execution/

Loading

Share via Email
Share on Facebook
Tweet on X (Twitter)
Share on Whatsapp
Share on LinkedIn
Share on Xing
Copy link