Tomiris is using public-service C2 implants and new phishing chains to stealthily deploy multi-language malware across targeted government networks.
The code pulls a malware loader from a Cloudflare Workers domain which, in turn, pulls two ZIP archives. These deploy two payloads, including a StealC infostealer and an auxiliary Python stealer, ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results
Feedback