The nefarious software utilizes a grabber function that steals private keys after it has been downloaded, unbeknownst to the user who may have visited or utilized various channels, such as file-hosting websites, torrent clients and any other shady downloaders.
Continue Reading on Coin Telegraph
Source: Cryptocurrency - investing.com