
The Many Faces of Undetected macOS InfoStealers | KeySteal, Atomic & CherryPie Continue to Adapt
We have been reporting on the rise of infostealers targeting macOS since early last year, but threat actors show no signs of slowing down. Throughout
We have been reporting on the rise of infostealers targeting macOS since early last year, but threat actors show no signs of slowing down. Throughout
Executive Summary Overview The cloud hacktool scene is highly intertwined, with many tools relying on one another’s code. This is particularly true for malware families
Last year, we documented malware distribution campaigns both via malvertising and compromised sites delivering Atomic Stealer (AMOS) onto Mac users. This stealer has proven to be quite popular in
FortiGuard Labs recently discovered a threat group using YouTube channels to distribute a Lumma Stealer variant…
To completely understand what’s going on in the info stealers market which has been growing in the last years…
Using the stolen account, the threat actor modified the AS number belonging to Orange’s IP address, resulting in major disruptions…
This method can be applied to multiple other C2 servers that we come across on a daily basis to check for any security misconfigurations…
A ZIP/LNK payload and, with some luck, we will end up identifying the infostealer that is being dropped and its source code…
Infostealers are a type of malware designed to steal information from the victim system in order to send it to the attacker…
A hacker who goes by the username “irleaks” posted a thread in which they attempt to sell over 160,000,000 records of Iranians…
RedLine Stealer is a dangerous type of malware that can cause serious harm to both individuals and organizations…
Learn about the threat of free Adversary-in-the-Middle (AiTM) phishing proxy Evilginx and how to mitigate it…
Resecurity’s HUNTER (HUMINT) spotted the author of perspective password stealer Medusa has released a new version…
Vidar steals information including login credentials, browser history, cookies and other data and sends it all back to the operator…
A detailed blog on Analysis of the Global Malware Trend: Exploiting Undocumented OAuth2 Functionality to Regenerate Google Service Cookies Regardless of IP or Password Reset…
Installation of Epsilon infostealer enabled exfiltration of browser-stored data, including passwords, credit cards, and cookies and more…
The threat landscape meets a new player – Rugmi Loader. This threat specializes in spreading spyware, and is in fact capable of delivering any malware type…
The Lumma Infostealer’s cookie restoration method operates by leveraging a key from restore files, allowing the revival of expired Google cookies…
Stay informed with the latest insights in our Infostealers weekly report. Explore key findings, trends and data on info-stealing activities.