Feb. 5, 2023, 6:32 p.m. | Guided Hacking

Guided Hacking www.youtube.com

Learn how threat actors frequently target other threat actors.
Support us on GH: https://guidedhacking.com/register/
Support us on Patreon: https://patreon.com/guidedhacking
Support us on YT: https://www.youtube.com/channel/UCCMi6F5Ac3kQDfffWXQGZDw/join

Read more:
https://guidedhacking.com/threads/how-threat-actors-infect-each-other-malware-analysis.20248/

When creating a video tutorial for the Guided Hacking Youtube channel, a free version of the widely-used RedLine Stealer malware was downloaded to use for screenshots. Upon examination, it was discovered that the cracked version had been modified with a binder to infect computers of users who ran it.

We will now go …

analysis channel computers cracked free hacking infect learn malware malware analysis redline redline stealer screenshots stealer target threat threat actors tutorial version video youtube

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Cloud Technical Solutions Engineer, Security

@ Google | Mexico City, CDMX, Mexico

Assoc Eng Equipment Engineering

@ GlobalFoundries | SGP - Woodlands

Staff Security Engineer, Cloud Infrastructure

@ Flexport | Bellevue, WA; San Francisco, CA

Software Engineer III, Google Cloud Security and Privacy

@ Google | Sunnyvale, CA, USA

Software Engineering Manager II, Infrastructure, Google Cloud Security and Privacy

@ Google | San Francisco, CA, USA; Sunnyvale, CA, USA