Compromising Google Accounts: Malwares Exploiting Undocumented OAuth2 Functionality for session hijacking.
![compromising google accounts malwares exploiting undocumented oauth2 functionality for session hijacking](https://www.infostealers.com/wp-content/uploads/2023/12/658e6a06e7844e205dae3b77_Auth-google-placeholder.webp)
A detailed blog on Analysis of the Global Malware Trend: Exploiting Undocumented OAuth2 Functionality to Regenerate Google Service Cookies Regardless of IP or Password Reset…
Epsilon infostealer spread via fan-made indie game expansion.
![epsilon infostealer spread via fan made indie game expansion](https://www.infostealers.com/wp-content/uploads/2023/12/computer-1500929_640.jpg)
Installation of Epsilon infostealer enabled exfiltration of browser-stored data, including passwords, credit cards, and cookies and more…
Novice Rugmi Loader Delivers Various Spyware.
![novice rugmi loader delivers various spyware](https://www.infostealers.com/wp-content/uploads/2023/12/Rugmi-Malware-Loader-1024x585.webp)
The threat landscape meets a new player – Rugmi Loader. This threat specializes in spreading spyware, and is in fact capable of delivering any malware type…
Breaking through the Infostealer Exploit and the Enigma of Cookie Restoration.
![breaking through the infostealer exploit and the enigma of cookie restoration](https://www.infostealers.com/wp-content/uploads/2023/12/1_DbrCSGoMlp7c018YgBTnQA.webp)
The Lumma Infostealer’s cookie restoration method operates by leveraging a key from restore files, allowing the revival of expired Google cookies…
Pure Logs Stealer Fails to Impress.
![pure logs stealer fails to impress](https://www.infostealers.com/wp-content/uploads/2023/12/ads-1024x615.jpeg)
Pure Logs Stealer first appeared on hacking forums at the end of October 2022. The stealer is developed by a malware developer…
The Google 0-day all Infostealer groups are exploiting.
![the 0 day all infostealer groups are exploiting](https://www.infostealers.com/wp-content/uploads/2023/12/WhatsApp-Image-2023-12-27-at-10.23.57.jpeg)
Today, even despite attempts to alert Google over a month ago that there is an ongoing 0-day being exploited by Infostealer groups…
Healthcare and Finance Suffer Most Cyberattacks.
![healthcare and finance suffer most cyberattacks](https://www.infostealers.com/wp-content/uploads/2023/12/0427_cyberattack-1024x640.webp)
During the summer of 2023, cyberattacks rose significantly, according to data from the new quarterly BlackBerry Global Threat Intelligence Report, November 2023 edition…
Windows, macOS targeted by novel JaskaGO infostealer.
![windows macos targeted by novel jaskago infostealer](https://www.infostealers.com/wp-content/uploads/2023/12/download.jpeg)
Windows and macOS systems have been subjected to attacks leveraging the novel Go-based information-stealing malware JaskaGO, reports The Hacker News…
8220 gang exploits old Oracle WebLogic vulnerability to deliver infostealers, cryptominers.
![8220 gang exploits old oracle weblogic vulnerability to deliver infostealers cryptominers](https://www.infostealers.com/wp-content/uploads/2023/12/Chain-of-infection-1024x334.jpg)
The 8220 gang has been leveraging an old Oracle WebLogic Server vulnerability (CVE-2020-14883) to distribute malware, the Imperva Threat Research team has found…
Hacker Sells Access to Binance’s Law Enforcement Portal.
![hacker sells access to binances law enforcement portal cryptocurrency holders at risk](https://www.infostealers.com/wp-content/uploads/2023/12/5926cdee-2f67-4413-97ad-5230e06cf502.jpeg)
A threat actor attempts to sell access to a sensitive area of Binance — the major cryptocurrency exchange’s…
Hacker Uses Infostealer Data to Gain Access to Brazil’s Police Portal.
![hacker uses infostealer data to gain access to brazils police portal](https://www.infostealers.com/wp-content/uploads/2023/12/1_2GTpAMY7UUDHdHB_1-Wrog-1024x487.webp)
It is not uncommon for threat actors to exploit login data obtained from Infostealer infections to carry out various types of cyberattacks…
Infostealer Credentials Compromise Password Managers, Posing Identity and Financial Theft Risks.
![infostealer credentials compromise password managers posing identity and financial theft risks](https://www.infostealers.com/wp-content/uploads/2023/12/1_VnDBnUAY4kpOIpCtY__RuQ-1024x475.png)
In today’s digital landscape, the reliance on password managers has become commonplace, providing users with a sense of security…