From LNK Payload to Infostealer Source Code
A ZIP/LNK payload and, with some luck, we will end up identifying the infostealer that is being dropped and its source code…
Infostealer – Trends and how to detect them before it’s too late
Infostealers are a type of malware designed to steal information from the victim system in order to send it to the attacker…
Mysterious hacker strikes Iran with major cyberattacks against industry leading companies
A hacker who goes by the username “irleaks” posted a thread in which they attempt to sell over 160,000,000 records of Iranians…
Unmasking RedLine Stealer
RedLine Stealer is a dangerous type of malware that can cause serious harm to both individuals and organizations…
Evilginx Phishing Proxy
Learn about the threat of free Adversary-in-the-Middle (AiTM) phishing proxy Evilginx and how to mitigate it…
New Version Of Meduza Stealer Released In Dark Web
Resecurity’s HUNTER (HUMINT) spotted the author of perspective password stealer Medusa has released a new version…
Big Game Hunting — Vidar Server Infrastructure in Germany
Vidar steals information including login credentials, browser history, cookies and other data and sends it all back to the operator…
Compromising Google Accounts: Malwares Exploiting Undocumented OAuth2 Functionality for session hijacking.
A detailed blog on Analysis of the Global Malware Trend: Exploiting Undocumented OAuth2 Functionality to Regenerate Google Service Cookies Regardless of IP or Password Reset…
Epsilon infostealer spread via fan-made indie game expansion.
Installation of Epsilon infostealer enabled exfiltration of browser-stored data, including passwords, credit cards, and cookies and more…
Novice Rugmi Loader Delivers Various Spyware.
The threat landscape meets a new player – Rugmi Loader. This threat specializes in spreading spyware, and is in fact capable of delivering any malware type…
Breaking through the Infostealer Exploit and the Enigma of Cookie Restoration.
The Lumma Infostealer’s cookie restoration method operates by leveraging a key from restore files, allowing the revival of expired Google cookies…
Pure Logs Stealer Fails to Impress.
Pure Logs Stealer first appeared on hacking forums at the end of October 2022. The stealer is developed by a malware developer…