Gen Blogs | Insights By +1Adolf Středa & 1 others March 31, 2026 • 12 min read Archived: 2026-04-05 17:58:12 UTC Research Why Join the Navy if You Can Be a Pirate? Though you might sometimes become cargo. Inside the macOS Cracked Software Pipeline Research From Celebrity Deepfakes to Avatar Farms, How Scammers Industrialize Trust When the face is familiar but the person isn’t real +2 Luis Corrons & 2 others March 26, 2026 • 10 min read Research The Reservation Hijack Scam: How attackers hijack hotel accounts to target guests From Booking-themed lures to compromised hospitality software, criminals are using reservation data and trusted workflows to make fraud feel like customer service. https://threatlabs.avast.com/botnet Page 1 of 7 +1 Martin Chlumecký & 1 others March 25, 2026 • 15 min read Research Torg Grabber: Anatomy of a New Credential Stealer A newly identified MaaS credential stealer evolves from Telegram exfiltration to encrypted TCP and full REST API infrastructure Threat Research Team March 24, 2026 • 68 min read Research The Malware with a Secret Identity: How We Unmasked Torg Grabber How a “Vidar” look‑alike turned out to be Torg Grabber—a fast‑growing infostealer-as-a-service with ClickFix lures, browser lockpicks and a sprawling criminal customer base Luis Corrons March 24, 2026 • 7 min read Research The Scam Ad Machine: Part II How scam ads hide in plain sight, survive takedowns, and keep coming back https://threatlabs.avast.com/botnet Page 2 of 7 +4 Luis Corrons & 4 others March 20, 2026 • 12 min read Research VoidStealer: Debugging Chrome to Steal Its Secrets A Novel Debugger-based ABE Bypass Spotted in the Wild Vojtěch Krejsa March 19, 2026 • 19 min read Research Fingerprinting AI Agent Skills: The Missing Identity Layer for Agent Plugins Why AI agent skills need their own fingerprint: a content-based ID that stays stable across packaging, platforms and marketplaces Michal Salát March 17, 2026 • 17 min read https://threatlabs.avast.com/botnet Page 3 of 7 Research Engineering the Future of Agentic Threat Hunting An Army for Every Analyst Luis Corrons March 13, 2026 • 7 min read Explore Insights Topics Research Why Join the Navy if You Can Be a Pirate? +1 Adolf Středa & 1 others March 31, 2026 • 12 min read Research From Celebrity Deepfakes to Avatar Farms, How Scammers Industrialize Trust +2 https://threatlabs.avast.com/botnet Page 4 of 7 Luis Corrons & 2 others March 26, 2026 • 10 min read Research The Reservation Hijack Scam: How attackers hijack hotel accounts to target guests +1 Martin Chlumecký & 1 others March 25, 2026 • 15 min read Research Torg Grabber: Anatomy of a New Credential Stealer Threat Research Team March 24, 2026 • 68 min read Research The Malware with a Secret Identity: How We Unmasked Torg Grabber https://threatlabs.avast.com/botnet Page 5 of 7 Luis Corrons March 24, 2026 • 7 min read Research The Scam Ad Machine: Part II +4 Luis Corrons & 4 others March 20, 2026 • 12 min read Research VoidStealer: Debugging Chrome to Steal Its Secrets Vojtěch Krejsa March 19, 2026 • 19 min read Research Fingerprinting AI Agent Skills: The Missing Identity Layer for Agent Plugins Michal Salát https://threatlabs.avast.com/botnet Page 6 of 7 March 17, 2026 • 17 min read Research Engineering the Future of Agentic Threat Hunting Luis Corrons March 13, 2026 • 7 min read Source: https://threatlabs.avast.com/botnet https://threatlabs.avast.com/botnet Page 7 of 7