{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreigwdotxgxafma6vhbegcwbl2q54uanzm73fdxr2kkmgsaulnfmz2q",
"uri": "at://did:plc:6wtxqaikjf62unmnajbfbq5v/app.bsky.feed.post/3micw7g6mn3q2"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreie22arob7ggawrkigss7he5aoaikdow2bgv5c26sl3luhfcebfap4"
},
"mimeType": "image/webp",
"size": 91742
},
"path": "/blankgrabber-hides-behind-a-fake-certificate-trick-to-deliver-stealer-malware/",
"publishedAt": "2026-03-30T16:42:48.000Z",
"site": "https://vpncentral.com",
"tags": [
"News",
"BlankGrabber hides behind a fake certificate trick to deliver stealer malware",
"VPN Central"
],
"textContent": "BlankGrabber, a Python-based stealer, now uses a fake certificate-decoding chain to hide its delivery process on Windows systems. Splunk’s Threat Research Team says the loader abuses certutil.exe, a legitimate Windows tool, to decode data that looks harmless but actually launches the next malware stage. That matters because the infection chain does more than steal browser […]\n\nThe post BlankGrabber hides behind a fake certificate trick to deliver stealer malware appeared first on VPN Central.",
"title": "BlankGrabber hides behind a fake certificate trick to deliver stealer malware"
}