Feb. 5, 2023, 6:32 p.m. | Guided Hacking

Guided Hacking www.youtube.com

Learn how threat actors frequently target other threat actors.
Support us on GH: https://guidedhacking.com/register/
Support us on Patreon: https://patreon.com/guidedhacking
Support us on YT: https://www.youtube.com/channel/UCCMi6F5Ac3kQDfffWXQGZDw/join

Read more:
https://guidedhacking.com/threads/how-threat-actors-infect-each-other-malware-analysis.20248/

When creating a video tutorial for the Guided Hacking Youtube channel, a free version of the widely-used RedLine Stealer malware was downloaded to use for screenshots. Upon examination, it was discovered that the cracked version had been modified with a binder to infect computers of users who ran it.

We will now go …

analysis channel computers cracked free hacking infect learn malware malware analysis redline redline stealer screenshots stealer target threat threat actors tutorial version video youtube

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Security Compliance Strategist

@ Grab | Petaling Jaya, Malaysia

Cloud Security Architect, Lead

@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)