Source: www.bleepingcomputer.com – Author: Bill Toulas The Lumma information-stealing malware is now using an interesting tactic to evade detection by security software – the measuring of mouse movements using trigonometry to determine if the malware is running on a real machine or an antivirus sandbox. Lumma (or LummaC2) is a malware-as-a-service information stealer rented to […]
La entrada Lumma Stealer malware now uses trigonometry to evade detection – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.