{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreigwdotxgxafma6vhbegcwbl2q54uanzm73fdxr2kkmgsaulnfmz2q",
    "uri": "at://did:plc:6wtxqaikjf62unmnajbfbq5v/app.bsky.feed.post/3micw7g6mn3q2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreie22arob7ggawrkigss7he5aoaikdow2bgv5c26sl3luhfcebfap4"
    },
    "mimeType": "image/webp",
    "size": 91742
  },
  "path": "/blankgrabber-hides-behind-a-fake-certificate-trick-to-deliver-stealer-malware/",
  "publishedAt": "2026-03-30T16:42:48.000Z",
  "site": "https://vpncentral.com",
  "tags": [
    "News",
    "BlankGrabber hides behind a fake certificate trick to deliver stealer malware",
    "VPN Central"
  ],
  "textContent": "BlankGrabber, a Python-based stealer, now uses a fake certificate-decoding chain to hide its delivery process on Windows systems. Splunk’s Threat Research Team says the loader abuses certutil.exe, a legitimate Windows tool, to decode data that looks harmless but actually launches the next malware stage. That matters because the infection chain does more than steal browser […]\n\nThe post BlankGrabber hides behind a fake certificate trick to deliver stealer malware appeared first on VPN Central.",
  "title": "BlankGrabber hides behind a fake certificate trick to deliver stealer malware"
}