Tag : stealer

25 attack reports | 0 vulnerabilities

Attack Reports

Title Published Tags Description Number of indicators
From the Depths: Analyzing the Cthulhu Stealer Malware for macOS Aug. 23, 2024, 9:17 a.m. This report analyzes Cthulhu Stealer, a malware-as-a-service targeting macOS users to steal credentials and cryptocurrency wallet… 9
Double Trouble: Latrodectus And ACR Stealer Observed Spreading Via Google Authenticator Phishing Site Aug. 20, 2024, 9:06 a.m. The Cyble Research and Intelligence Lab (CRIL) discovered a sophisticated phishing website mimicking Google Safety Centre, design… 15
Ailurophile: G DATA has sighted a new info stealer in the wild Aug. 19, 2024, 1:39 p.m. G DATA has detected a novel information-stealing malware, dubbed 'Ailurophile Stealer'. It is a PHP-based stealer offered through… 2
Exploring the D3F@ck Malware-as-a-Service Loader Aug. 19, 2024, 1:17 p.m. This report analyzes the D3F@ck Loader, a malware-as-a-service (MaaS) offering orchestrated by an individual going by the alias S… 4
Multiple Malware Dropped Through MSI Package Aug. 14, 2024, 11:14 a.m. An analysis reveals the distribution of malware through an MSI package, specifically SectopRat and Redline stealer. The malware e… 11
Ande Loader Leads to 0bj3ctivity Stealer Infection Aug. 12, 2024, 11:26 a.m. In July 2024, eSentire's Threat Response Unit observed a phishing attack leading to a 0bj3ctivity Stealer malware infection. The … 2
RHADAMANTHYS: In-Depth Analysis of a Sophisticated Stealer Targeting Israeli Users Aug. 5, 2024, 8:39 a.m. This comprehensive technical analysis delves into the intricate workings of an advanced and localized malware campaign employing … 5
Brief Overview of the DeerStealer Distribution Campaign Aug. 2, 2024, 8:50 a.m. A recent cybersecurity investigation uncovered a malware distribution campaign called DeerStealer. The malware was disseminated t… 28
Threat actor impersonates Google via fake ad for Authenticator July 31, 2024, 10:38 a.m. An unknown threat actor created a deceptive advertisement that appeared as if it was from a reputable company, enticing users to … 5
Malware Distributed Using Falcon Sensor Update Phishing Lure July 29, 2024, 11:40 a.m. CrowdStrike Intelligence uncovered a phishing campaign impersonating CrowdStrike and distributing malicious files containing a Mi… 32
Threat Actor Distributes Python-Based Info Stealer Using Fake Update July 29, 2024, 11:29 a.m. An unidentified threat actor exploited the July 19, 2024 Falcon sensor content issue to distribute a Python-based information ste… 30
Threat Actor Uses Fake Recovery Manual to Deliver Unidentified Stealer July 24, 2024, 8:06 a.m. An intelligence report outlines a campaign where an unidentified threat actor impersonated a Microsoft recovery manual through a … 6
Exploiting CVE-2024-21412: A Stealer Campaign Unleashed July 24, 2024, 8:02 a.m. This report details a malicious campaign exploiting the CVE-2024-21412 vulnerability in Microsoft Windows SmartScreen to bypass s… 27
Braodo Info Stealer Targeting Vietnam and Abroad July 15, 2024, 10:42 a.m. CYFIRMA discovered Braodo Stealer, a Python-based malware active since early 2024, primarily targeting users in Vietnam but also … 14
Fake Microsoft Teams for Mac delivers Atomic Stealer July 12, 2024, 6:21 p.m. A malvertising campaign lures Mac users into downloading a counterfeit Microsoft Teams installer containing Atomic Stealer, a dat… 6
Increase In The Exploitation Of Microsoft SmartScreen Vulnerability CVE-2024-21412 July 11, 2024, 1:12 p.m. Cyble analyzes an ongoing campaign exploiting a Microsoft SmartScreen vulnerability to deliver stealers through spam emails. The … 12
Kematian-Stealer: A Deep Dive into a New Information Stealer July 10, 2024, 10:08 a.m. This report provides an in-depth analysis of a newly discovered information stealer named Kematian-Stealer, actively developed on… 4
Death Stealer forked from PowerShell Token Grabber July 5, 2024, 8:14 a.m. The report analyzes Kematian Stealer, a sophisticated PowerShell-based malware that exfiltrates sensitive data from infected syst… 0
StrelaStealer Resurgence: Tracking a JavaScript-Driven Credential Stealer Targeting Europe June 25, 2024, 1:07 p.m. Recent observations indicate a surge in JavaScript spreading StrelaStealer, a credential stealer specifically targeting Outlook a… 5
Iluria Stealer; a Variant of Another Discord Stealer May 24, 2024, 8:36 a.m. Researchers uncover a new malware variant called Iluria Stealer, created by the developer behind Nikki Stealer, utilizing the ali… 5
Crimeware report: Acrid, ScarletStealer and Sys01 stealers May 22, 2024, 3:33 p.m. This analysis delves into three distinct stealers: Acrid, ScarletStealer, and Sys01. Acrid is a new stealer found in December, em… 5
Code Emulation and Cybercrime Infrastructure Discovery May 8, 2024, 11:18 a.m. This report details the analysis of a malspam campaign utilizing the Matanbuchus loader, which involved decrypting strings within… 76
Stealer Distributed via Crafted Minecraft Source Pack May 8, 2024, 11:09 a.m. This report details the operation of the zEus stealer malware, which is distributed through a crafted Minecraft source pack. The … 23
HijackLoader Updates May 7, 2024, 8:36 a.m. HijackLoader, also known as IDAT Loader, is a modular malware loader capable of executing multiple payloads. It utilizes a variet… 11
Fletchen Stealer: An Information Stealer with Sophisticated Anti-Analysis Measures April 29, 2024, 6:16 p.m. This in-depth analysis examines Fletchen stealer, an advanced information-stealing malware featuring potent anti-analysis capabil… 13