Event JSON
{
"id": "b7010f354e789ec815f5d5a456c7ea66a39ccdf3541bb43aa2e2a1233bd9cffb",
"pubkey": "1c3c7f2ecdd6ff93c8cc00dfe14d0249efa07289c1d11925ab91cdc317baef36",
"created_at": 1716218610,
"kind": 1,
"tags": [
[
"t",
"grandoreiro"
],
[
"t",
"banques"
],
[
"t",
"outlook"
],
[
"t",
"emails"
],
[
"t",
"phishing"
],
[
"t",
"algorithme"
],
[
"t",
"informatique"
],
[
"t",
"malware"
],
[
"t",
"hacking"
],
[
"t",
"cybersécurité"
],
[
"r",
"https://thehackernews.com/2024/05/grandoreiro-banking-trojan-resurfaces.html"
]
],
"content": "Le cheval de Troie bancaire #Grandoreiro est de retour, ciblant plus de 1 500 #banques dans plus de 60 pays. Il utilise désormais #Outlook infecté pour diffuser des #emails de #phishing, avec un #algorithme de génération de domaine mis à jour et une capacité d'évasion anti-malware.\n\n#Informatique #Malware #Hacking #CyberSécurité\n\nhttps://thehackernews.com/2024/05/grandoreiro-banking-trojan-resurfaces.html",
"sig": "a6045a16ff8a026762897b8591a0037777a60067dc1f9106da2f1f3233b1ad5b9d686c9b98a00f7d4aa364f2d419b5fc4f1def183934149c1870b9afdd2dd104"
}