"The C2 hosts a web-based graphical user interface (GUI) titled 'NEXUS Listener' that can be used to view stolen information ...
A supply-chain attack backdoored versions of Axios, a popular JavaScript library that's present in many different software ...