Banking Malware Intercepts and Logs Network Traffic

Banking Malware Intercepts and Logs Network Traffic

Stolen information is encrypted and stored in registry entry