The threat group uses its “Stargazers Ghost Network” to star, fork, and watch malicious repos to make them seem legitimate, all to distribute a variety of notorious information-stealers-as-a-service.
The threat group uses its “Stargazers Ghost Network” to star, fork, and watch malicious repos to make them seem legitimate, all to distribute a variety of notorious information-stealers-as-a-service.
Discover more from Cyber Insights
Subscribe to get the latest posts sent to your email.