Approaching Stealers Devs (7 parts series)
To completely understand what’s going on in the info stealers market which has been growing in the last years…
Home » Approaching stealers devs
To completely understand what’s going on in the info stealers market which has been growing in the last years…
“Meta” is a Greek-origin prefix that means after, beyond, or at a higher level. The same vision of this word is shared between Mark Zuckerberg…
STEALC uses a unique log exfiltration by parts on exe builds. This type of communication between build and server panel…
Amadey is a malware known as a “loader”: its main functionality is to load other payloads for all or specifically targeted computers…
Vidar is one of the top 5 stealers in the market but their users are doing a good job hiding their activity…
Meduza is one of the youngest malware projects that I’ve seen on the market. It is kind of active at the moment…
Recordbreaker is also the first User Agent found on Raccoon V2 builds in order to communicate to C2 servers…
It is a fact that the use of Lumma has been increasing a lot: some people participating actively in the market…
Stay informed with the latest insights in our Infostealers weekly report. Explore key findings, trends and data on info-stealing activities.