1 link tagged with all of: cybersecurity + malware + analysis + phishing + phantom-stealer
Links
This article investigates a Russian phishing campaign that uses a fake payment confirmation email to deploy the Phantom stealer malware. It details the multi-stage infection process, including the malicious ISO and executable files involved, and highlights the types of data targeted, such as credentials and cryptocurrency information.
phishing ✓
malware ✓
phantom-stealer ✓
cybersecurity ✓
analysis ✓