The information gathering Trojan can continuously monitor clipboard content, searching for cryptocurrency keys and passwords.
Source link

The information gathering Trojan can continuously monitor clipboard content, searching for cryptocurrency keys and passwords.
Source link