Remove 2019 Remove Data collection Remove Malware Remove Passwords
article thumbnail

Accused ‘Raccoon’ Malware Developer Fled Ukraine After Russian Invasion

Krebs on Security

A 26-year-old Ukrainian man is awaiting extradition from The Netherlands to the United States on charges that he acted as a core developer for Raccoon , a popular “malware-as-a-service” offering that helped paying customers steal passwords and financial data from millions of cybercrime victims. The Raccoon v.

Malware 299
article thumbnail

New Version of Meduza Stealer Released in Dark Web

Security Affairs

On Christmas Eve, Resecurity’s HUNTER unit spotted the author of perspective password stealer Meduza has released a new version (2.2). Under Christmas tree you can find great gifts such as significant improvements of user interface (panel), modal windows on loading and expansion of data collection objects.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Silent Night Zeus botnet available for sale in underground forums

Security Affairs

Experts found multiple variants in the wild, many of them belonging to the Terdot Zbot/Zloader malware family. Data collected by the malware are then transferred to the operator’s command-and-control (C2) server. The malware is able to infect all operating systems. .”

Banking 135
article thumbnail

Ransomware Revival: Troldesh becomes a leader by the number of attacks

Security Affairs

Ransomware accounted for over half of all malicious mailings in H1 2019, Troldesh aka Shade being the most popular tool among cybercriminals. The first half of 2019 saw a 10-fold increase in the number of password-protected objects, such as documents and archive files, being used to deliver malware. rar archive files.

article thumbnail

Zero Trust Speeds Ransomware Response, Illumio-Bishop Fox Test Finds

eSecurity Planet

From mass production of cheap malware to ransomware as a service (RaaS) , cyber criminals have industrialized cybercrime, and a new HP Wolf Security report warns that cybercriminals are adapting advanced persistent threat (APT) tactics too. EDR gains visibility on what’s happening on an organization’s endpoints by capturing activity data.

article thumbnail

Antlion APT group used a custom backdoor that allowed them to fly under the radar for months

Security Affairs

” xPack allowed threat actors to run WMI commands remotely and mount shares over SMB to transfer data from C2 servers to them. The malware was also used by the attackers to browse the web, likely using it as a proxy to mask their IP address. In some cases threat actors staged stolen data for further exfiltration.

article thumbnail

Grandoreiro Malware implements new features in Q2 2020

Security Affairs

The updated Grandoreiro Malware equipped with latenbot-C2 features in Q2 2020 now extended to Portuguese banks. This piece of malware includes improvements in the way it is operating. The Grandoreiro malware has been distributed via malscan campaigns around the globe during Q2 2020. Technical Analysis. 100:51224/$rdgate?

Malware 66