Tag: maas
2 attack reports | 0 vulnerabilities
Attack reports
Unmasking Lumma Stealer: Analyzing Deceptive Tactics with Fake CAPTCHA
Lumma Stealer, a sophisticated information-stealing malware, has evolved its tactics to employ fake CAPTCHA verification for payload delivery. The malware exploits legitimate software and uses multi-stage fileless techniques to evade detection. Its infection chain involves PowerShell scripts, proce…
Downloadable IOCs 23
From the Depths: Analyzing the Cthulhu Stealer Malware for macOS
This report analyzes Cthulhu Stealer, a malware-as-a-service targeting macOS users to steal credentials and cryptocurrency wallets. It explores the malware's functionality, including prompting users for passwords, dumping keychain data, and exfiltrating stolen information. The analysis compares Cth…
Downloadable IOCs 9
Unmasking Lumma Stealer: Analyzing Deceptive Tactics with Fake CAPTCHA
Lumma Stealer, a sophisticated information-stealing malware, has evolved its tactics to employ fake CAPTCHA verification for payload delivery. The malware exploits legitimate software and uses multi-stage fileless techniques to evade detection. Its infection chain involves PowerShell scripts, proce…
Downloadable IOCs 23
From the Depths: Analyzing the Cthulhu Stealer Malware for macOS
This report analyzes Cthulhu Stealer, a malware-as-a-service targeting macOS users to steal credentials and cryptocurrency wallets. It explores the malware's functionality, including prompting users for passwords, dumping keychain data, and exfiltrating stolen information. The analysis compares Cth…
Downloadable IOCs 9