{"id":4767,"date":"2025-06-28T09:11:29","date_gmt":"2025-06-28T09:11:29","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/06\/28\/giftedcrook-malware-evolves-from-browser-stealer-to-intelligence-gathering-tool\/"},"modified":"2025-06-28T09:11:29","modified_gmt":"2025-06-28T09:11:29","slug":"giftedcrook-malware-evolves-from-browser-stealer-to-intelligence-gathering-tool","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/06\/28\/giftedcrook-malware-evolves-from-browser-stealer-to-intelligence-gathering-tool\/","title":{"rendered":"GIFTEDCROOK Malware Evolves: From Browser Stealer to Intelligence-Gathering Tool"},"content":{"rendered":"<p>\u200bThe threat actor behind the GIFTEDCROOK malware has made significant updates to turn the malicious program from a basic browser data stealer to a potent intelligence-gathering tool.<br \/>\n&#8220;Recent campaigns in June 2025 demonstrate GIFTEDCROOK&#8217;s enhanced ability to exfiltrate a broad range of sensitive documents from the devices of targeted individuals, including potentially proprietary files and\u00a0The threat actor behind the GIFTEDCROOK malware has made significant updates to turn the malicious program from a basic browser data stealer to a potent intelligence-gathering tool.<br \/>\n&#8220;Recent campaigns in June 2025 demonstrate GIFTEDCROOK&#8217;s enhanced ability to exfiltrate a broad range of sensitive documents from the devices of targeted individuals, including potentially proprietary files and\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bThe threat actor behind the GIFTEDCROOK malware has made significant updates to turn the malicious program from a basic browser data stealer to a potent intelligence-gathering tool. &#8220;Recent campaigns in June 2025 demonstrate GIFTEDCROOK&#8217;s enhanced ability to exfiltrate a broad range of sensitive documents from the devices of targeted individuals, including potentially proprietary files and\u00a0The&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/06\/28\/giftedcrook-malware-evolves-from-browser-stealer-to-intelligence-gathering-tool\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">GIFTEDCROOK Malware Evolves: From Browser Stealer to Intelligence-Gathering Tool<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":4768,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/4767"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=4767"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/4767\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/4768"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=4767"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=4767"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=4767"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}