Researchers say threat actors used the sophisticated — and unfortunately named — toolkit to target high-value networks for ...
The hackers use fake CAPTCHA pages—which are designed to mimic standard security checks—to trick users into installing malicious software (“Stealthy StealC Information Stealer”) via keyboard commands.