New research reveals that a new ACRStealer variant is now being actively deployed as a final payload by HijackLoader, using low”‘level syscalls, AFD-based networking, TLS C2, and flexible secondary payload delivery to evade detection and maximize data theft. The newly observed samples confirm that HijackLoader is dropping a rebranded ACRStealer variant previously linked to the […] The post ACRStealer Variant Deploys Syscall Evasion, TLS C2, Secondary Payloads appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
First seen on gbhackers.com
Jump to article: gbhackers.com/acrstealer-variant/
![]()

