Operation Magnus: Joint Law Enforcement Operation Targets Major Infostealer Networks

Read more about a joint operation between several law enforcement agencies across the globe to tackle RedLine Stealer and META malware. Continue reading Operation Magnus: Joint Law Enforcement Operation Targets Major Infostealer Networks

Lumma/Amadey: fake CAPTCHAs want to know if you’re human

Malicious CAPTCHA distributed through ad networks delivers the Amadey Trojan or the Lumma stealer, which pilfers data from browsers, password managers, and crypto wallets. Continue reading Lumma/Amadey: fake CAPTCHAs want to know if you’re human

Stealer here, stealer there, stealers everywhere!

Kaspersky researchers investigated a number of stealer attacks over the past year, and they are now sharing some details on the new Kral stealer, recent AMOS version and Vidar delivering ACR stealer. Continue reading Stealer here, stealer there, stealers everywhere!

Whispers from the Dark Web Cave. Cyberthreats in the Middle East

The Kaspersky Digital Footprint Intelligence team shares insights into the H1 2024 Middle Eastern cyberthreat landscape: hacktivism, initial access brokers, ransomware, stealers, and so on. Continue reading Whispers from the Dark Web Cave. Cyberthreats in the Middle East

Access control is going mobile — Is this the way forward?

Last year, the highest volume of cyberattacks (30%) started in the same way: a cyber criminal using valid credentials to gain access. Even more concerning, the X-Force Threat Intelligence Index 2024 found that this method of attack increased by 71% from 2022. Researchers also discovered a 266% increase in infostealers to obtain credentials to use […]

The post Access control is going mobile — Is this the way forward? appeared first on Security Intelligence.

Continue reading Access control is going mobile — Is this the way forward?

Tusk: unraveling a complex infostealer campaign

Kaspersky researchers discovered Tusk campaign with ongoing activity that uses Danabot and StealC infostealers and clippers to obtain cryptowallet credentials and system data. Continue reading Tusk: unraveling a complex infostealer campaign

Paris Olympics 2024: Cyber Attackers are Targeting Companies Associated With Games, Report Finds

The authors of the report also say that attendees will “almost certainly” be targeted with Olympics-related phishing schemes. Continue reading Paris Olympics 2024: Cyber Attackers are Targeting Companies Associated With Games, Report Finds

How the ZeuS Trojan Info Stealer Changed Cybersecurity

Information stealer malware is a type of malicious software designed to collect sensitive information from a victim’s computer. Also known as info stealers, data stealers or data-stealing malware, this software is true to its name: after infecting a computer or device, it’s highly adept at exfiltrating login credentials, financial information and personal data. Info stealers […]

The post How the ZeuS Trojan Info Stealer Changed Cybersecurity appeared first on Security Intelligence.

Continue reading How the ZeuS Trojan Info Stealer Changed Cybersecurity

Raccoon Malware Aims to Steal Credentials of People Who Use Popular Apps

Security researchers have followed the evolution of a piece of infostealer malware named Raccoon, as it’s being developed and enhanced to work in as many scenarios as possible, including email clients, Internet browsers, and more. Infostealers ar… Continue reading Raccoon Malware Aims to Steal Credentials of People Who Use Popular Apps