Remove Advertising Remove Antivirus Remove Cryptocurrency Remove Data collection
article thumbnail

Ransomware Revival: Troldesh becomes a leader by the number of attacks

Security Affairs

To bypass antivirus systems, hackers send out malicious emails in non-working hours with delayed activation. CERT-GIB’s report is based on data collected and analyzed by the Threat Detection System (TDS) Polygon as part of operations to prevent and detect threats distributed online in H1 2019 in more than 60 countries.

article thumbnail

Technical Analysis of Bandit Stealer

Security Boulevard

Key Points Bandit is a new information stealer that harvests stored credentials from web browsers, FTP clients, email clients, and targets cryptocurrency wallet applications. Bandit collects sensitive information from victims' machines including cookies, saved login data, and credit card information from more than a dozen web browsers.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Mystic Stealer

Security Boulevard

Stealers" are a kind of malware designed to run on an endpoint post-compromise, while their primary features center on the theft of user data. Key Mystic Stealer functions include its ability to extract data from web browsers and cryptocurrency wallets. MysticStealer forum post advertising v1.2 But it doesn't stop there.

article thumbnail

Drawing the RedLine – Insider Threats in Cybersecurity

Security Boulevard

RedLine is a malware service available for purchase on underground forums that specifically targets the theft of sensitive information: passwords, credit cards, execution environment data, computer name, installed software, and more recently, cryptocurrency wallets and related files. Data collection from FTP clients, IM clients.