A newly identified malware variant dubbed ACRStealer has been observed leveraging Google Docs as a command-and-control (C2) server to bypass traditional security defenses and harvest sensitive login credentials. This sophisticated attack vector exploits the trusted reputation of Google’s infrastructure to evade detection, marking a significant escalation in credential-theft campaigns. Cybersecurity firm ThreatSec disclosed the campaign
The post ACRStealer Malware Exploiting Google Docs as C2 To Steal Login Credentials appeared first on Cyber Security News. Read More
%20used%20as%20an%20intermediary%20C2%20(Source%20-ASEC).webp)
Posted inNews