Zebrocy Operators Also Look for Browser and Email Databases

Malware researchers analyzing the Zebrocy kit determined that the operators run commands manually to collect information of interest from infected systems. […]


Click here for original story, Zebrocy Operators Also Look for Browser and Email Databases


Source: Bleeping Computer