Besides incorporating more anti-analysis and anti-virtualization checks, Typhon Reborn V2 removes its persistence features, instead opting to terminate itself after exfiltrating the data.
The malware ultimately transmits the collected data in a compressed archive via HTTPS using the Telegram API, marking continued abuse of the messaging platform. https://thehackernews.com/2023/04/typhon-reborn-stealer-malware.html #CyberSecurity #TyphoonStealerV2 #DataStealer #TelegramAPI
The malware ultimately transmits the collected data in a compressed archive via HTTPS using the Telegram API, marking continued abuse of the messaging platform. https://thehackernews.com/2023/04/typhon-reborn-stealer-malware.html #CyberSecurity #TyphoonStealerV2 #DataStealer #TelegramAPI
