In order to produce complex and sophisticated attacks, information stealers such as “Prynt” are used by threat actors.

Read more here.