


Having downloaded and installed an infected version of the software for further investigation, Kaspersky’s workers reveal that a Bash stealer is deployed to collect information such as system information, browsing history, saved passwords, cryptocurrency wallet files, and credentials for cloud services - specifically, AWS, Google Cloud, Oracle Cloud Infrastructure, Azure.įortunately, the researchers also revealed how the malicious version of the software had been distributed.
