SocGholish Diversifies and Expands Its Malware Staging Infrastructure to Counter Defenders
Attackers conduct a variety of activities after gaining access through SocGholish, such as system and network reconnaissance, establishing persistence, and deployment of additional tools and malware.