Key Learnings from Files Present on the C2 Server of an Infamous Infostealer Malware
This method can be applied to multiple other C2 servers that we come across on a daily basis to check for any security misconfigurations…
Home » VirusTotal
This method can be applied to multiple other C2 servers that we come across on a daily basis to check for any security misconfigurations…
A ZIP/LNK payload and, with some luck, we will end up identifying the infostealer that is being dropped and its source code…
A coalition of international law enforcement agencies has been investigating the creator and distributor of the notorious infostealer variant RedLine in an operation codenamed “Operation
Executive Summary ReversingLabs’ machine learning-based threat hunting system detected malicious code in a legitimate looking package, aiocpa, last week that was engineered to compromise crypto currency wallets. RL
Cado Security Labs have identified a new sophisticated scam targeting people who work in Web3. The campaign includes crypto stealer Realst that has both macOS
Stay informed with the latest insights in our Infostealers weekly report. Explore key findings, trends and data on info-stealing activities.