Key Learnings from Files Present on the C2 Server of an Infamous Infostealer Malware
This method can be applied to multiple other C2 servers that we come across on a daily basis to check for any security misconfigurations…
Home » Infostealers » Page 3
This method can be applied to multiple other C2 servers that we come across on a daily basis to check for any security misconfigurations…
Infostealers are a type of malware designed to steal information from the victim system in order to send it to the attacker…
RedLine Stealer is a dangerous type of malware that can cause serious harm to both individuals and organizations…
Vidar steals information including login credentials, browser history, cookies and other data and sends it all back to the operator…
Installation of Epsilon infostealer enabled exfiltration of browser-stored data, including passwords, credit cards, and cookies and more…
The threat landscape meets a new player – Rugmi Loader. This threat specializes in spreading spyware, and is in fact capable of delivering any malware type…
Pure Logs Stealer first appeared on hacking forums at the end of October 2022. The stealer is developed by a malware developer…
During the summer of 2023, cyberattacks rose significantly, according to data from the new quarterly BlackBerry Global Threat Intelligence Report, November 2023 edition…
Windows and macOS systems have been subjected to attacks leveraging the novel Go-based information-stealing malware JaskaGO, reports The Hacker News…
The 8220 gang has been leveraging an old Oracle WebLogic Server vulnerability (CVE-2020-14883) to distribute malware, the Imperva Threat Research team has found…
It is not uncommon for threat actors to exploit login data obtained from Infostealer infections to carry out various types of cyberattacks…
In today’s digital landscape, the reliance on password managers has become commonplace, providing users with a sense of security…
Introduction Recent research from Halcyon has uncovered a novel approach by a threat actor — referred to as Codefinger — who is actively abusing Amazon Web Services (AWS) by
In December 2024, two critical vulnerabilities in Microsoft’s Windows Lightweight Directory Access Protocol (LDAP) were addressed via Microsoft’s monthly Patch Tuesday release. Both vulnerabilities were deemed as highly significant
Telefonica, a major telecommunications company, recently confirmed a breach in their internal ticketing system, which led to a significant data leak. The breach involved unauthorized
Stay informed with the latest insights in our Infostealers weekly report. Explore key findings, trends and data on info-stealing activities.