Previously limited to initial access brokering, the Gootloader group has pivoted to a nasty post-compromise “GootBot” attack, each implant with its own C2.
This article has been indexed from Dark Reading
Previously limited to initial access brokering, the Gootloader group has pivoted to a nasty post-compromise “GootBot” attack, each implant with its own C2.