How Cracks and Installers Bring Malware to Your Device

Jan. 15, 2025, 7:48 p.m.

Description

Trend Micro research shows how attackers use platforms like YouTube to spread fake installers via trusted hosting services, employing encryption to evade detection and steal sensitive browser data.

Date

  • Created: Jan. 14, 2025, 3:22 p.m.
  • Published: Jan. 14, 2025, 3:22 p.m.
  • Modified: Jan. 15, 2025, 7:48 p.m.

Attack Patterns

  • MARSSTEALER
  • RUGMI
  • Sodinokibi
  • Sodin
  • REvil - S0496
  • LummaStealer
  • PENGUISH
  • Amadey - S1025
  • Vidar
  • PrivateLoader
  • T1588.001
  • T1588.002
  • T1573.002
  • T1547.001
  • T1012
  • T1056.001
  • T1071.001
  • T1204.002
  • T1082
  • T1057
  • T1083
  • T1055
  • T1112
  • T1059