[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fEyKPbISx_pRrKz3pytvac4gw3jUmd69GMWREf0H3NOE":3},{"article":4,"iocs":43},{"id":5,"title":6,"slug":7,"summary":6,"ai_summary":8,"brief":9,"full_text":10,"url":11,"image_url":12,"published_at":13,"ingested_at":14,"relevance_score":15,"entities":16,"category_id":26,"category":27,"article_tags":30},"7c1eb1bd-dea2-4d5d-86f9-c559e543a802","RDP Stealer with Windows Defender Bypass https:\u002F\u002Ft.co\u002F4jNuZxUJMZ","rdp-stealer-with-windows-defender-bypass-https-t-co-4jnuzxujmz-b2608a","Security researchers have identified a malware variant designed to steal Remote Desktop Protocol (RDP) credentials while evading Windows Defender detection. The malware employs anti-analysis and defense-bypass techniques to establish persistence on compromised systems. This threat is part of a broader trend of credential-theft malware targeting remote access protocols.","RDP stealer malware discovered with Windows Defender evasion capability.",null,"https:\u002F\u002Fx.com\u002FDarkWebInformer\u002Fstatus\u002F2055785513496273121","https:\u002F\u002Fpbs.twimg.com\u002Famplify_video_thumb\u002F2055785366729191424\u002Fimg\u002FnXiKMrvVNo80gRaj.jpg","2026-05-16T23:00:35+00:00","2026-05-17T00:00:12.090708+00:00",7,[17,20,23],{"name":18,"type":19},"Windows Defender","product",{"name":21,"type":22},"Microsoft","vendor",{"name":24,"type":25},"Remote Desktop Protocol (RDP)","technology","89f78b1c-3503-45a1-9fc7-e23d2ce1c6d5",{"id":26,"icon":10,"name":28,"slug":29},"Malware","malware",[31,36,38],{"category":32},{"id":33,"icon":10,"name":34,"slug":35},"02371804-cf6d-4449-98de-f1a2d4d9b266","Tools","tools",{"category":37},{"id":26,"icon":10,"name":28,"slug":29},{"category":39},{"id":40,"icon":10,"name":41,"slug":42},"e7b231c8-5f79-4465-8d38-1ef13aea5a14","Threat Intelligence","threat-intelligence",[44],{"type":29,"value":45,"context":46},"RDP Stealer","Malware family capable of stealing RDP credentials and bypassing Windows Defender"]