New research reveals that a new ACRStealer variant is now being actively deployed as a final payload by HijackLoader, using low‑level syscalls, AFD-based networking, TLS C2, and flexible secondary payload delivery to evade detection and maximize data theft. The newly observed samples confirm that HijackLoader is dropping a rebranded ACRStealer variant previously linked to the […]
The post ACRStealer Variant Deploys Syscall Evasion, TLS C2, Secondary Payloads appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Mayura Kathir
Source: gbHackers
Source Link: https://gbhackers.com/acrstealer-variant/