Technology ❯ Cybersecurity ❯ Malware ❯ Infostealers
The operation blends into ordinary traffic by using Google Calendar for configuration, with payloads concealed in PNG images on public CDNs.