ID | Votes | Profile Description |
---|---|---|
Lummac2 Stealer | 2 | LummaC2 Stealer is a prominent malware that has been increasingly utilized for initial access or information stealing over the past year. This malicious software, which can infiltrate systems through suspicious downloads, emails, or websites, is designed to exploit and damage computers or devices by |
ID | Type | Votes | Profile Description |
---|---|---|---|
Vidar | Unspecified | 3 | Vidar is a type of malware specifically designed to infiltrate and exploit Windows-based systems. It's written in C++ and is based on the Arkei stealer, which means it has the capability to steal personal information from infected devices. Vidar has been found impersonating legitimate software appli |
Redline | Unspecified | 3 | RedLine is a type of malware, specifically an infostealer, that has been historically favored by threat actors selling logs through platforms such as 2easy. It is often mentioned alongside other malicious software like Anubis, SpiderMan, Oski Stealer, and Loki Stealer on communication platforms like |
Raccoon | Unspecified | 2 | Raccoon is a type of malware, specifically an infostealer, used predominantly by the Scattered Spider threat actors to obtain login credentials, browser cookies, and histories. This malicious software, which is sold as Malware-as-a-Service (MaaS) on dark web forums, is both effective and inexpensive |
Preview | Source Link | CreatedAt | Title |
---|---|---|---|
InfoSecurity-magazine | 9 days ago | Would-Be OnlyFans Hackers Targeted With Infostealer | |
InfoSecurity-magazine | 16 days ago | LummaC2 Infostealer Resurfaces With Obfuscated PowerShell Tactics | |
InfoSecurity-magazine | 5 months ago | Famous YouTube Channels Hacked to Distribute Infostealers | |
CERT-EU | 6 months ago | CVE-2024-21412 Used in DarkGate Malware Campaigns | |
CERT-EU | 6 months ago | ChatGPT credentials snagged by infostealers on 225K infected devices | |
CERT-EU | 6 months ago | Alert: Info Stealers Target Stored Browser Credentials | |
BankInfoSecurity | 6 months ago | Alert: Info Stealers Target Stored Browser Credentials | |
CERT-EU | 6 months ago | IBM X-Force Threat Intelligence Index 2024 | |
CERT-EU | 6 months ago | Ransomware crews lean into infostealers for initial access | |
CERT-EU | 8 months ago | Activity of Rugmi malware loader spikes | |
CERT-EU | a year ago | Xenomorph Android Banking Trojan Makes Landfall in US | |
DARKReading | 10 months ago | Malware Uses Trigonometry to Track Mouse Strokes | |
CERT-EU | 10 months ago | LummaC2 v4.0 Malware Stealing Data with Trigonometry to Detect Human Users | |
CERT-EU | 10 months ago | LummaC2 4.0 infostealer uses trigonometry to avoid sandboxes | |
CERT-EU | 10 months ago | Malware Uses Trigonometry to Track Mouse Strokes | |
CERT-EU | 10 months ago | Lumma Stealer malware now uses trigonometry to evade detection | |
InfoSecurity-magazine | 10 months ago | Infostealer Lumma Evolves With New Anti-Sandbox Method | |
CERT-EU | 10 months ago | LummaC2 Malware Deploys New Trigonometry-Based Anti-Sandbox Technique | |
CERT-EU | a year ago | Microsoft: Octo Tempest is one of the most dangerous financial hacking groups | |
CERT-EU | a year ago | Data Thieves Test-Drive Unique Certificate Abuse Tactic |