Previously limited to initial access brokering, the Gootloader group has pivoted to a nasty post-compromise “GootBot” attack, each implant with its own C2.
Source: Dark Reading: Cloud
Previously limited to initial access brokering, the Gootloader group has pivoted to a nasty post-compromise “GootBot” attack, each implant with its own C2.
Source: Dark Reading: Cloud