The credential-stealing trash panda is using the chat app to store and update C2 addresses as crooks find creative new ways to distribute the malware.
Source: Healthcareitnews.com and Read More
How Hackers Use GhostGPT to Generate Malware & Exploits?
The increased misuse of GhostGPT has intensified cybersecurity threats, rendering traditional defenses like signature-based detection ineffective. The AI’s ability to produce unique, high-level malware boosts