Technology ❯ Cybersecurity ❯ Malware ❯ Infostealers
Researchers say the modular, role-based scheme can quickly regenerate despite takedowns.