The nefarious software utilizes a grabber function that steals private keys after it has been downloaded, unbeknownst to the user who may have visited or utilized various channels, such as file-hosting websites, torrent clients and any other shady downloaders.
Continue Reading on Coin Telegraph

