Threat to Security: Lumma Infostealer Unlocks Unstoppable Access to Google Cookies.

In a significant development, the creators of the well-known Infostealer group, Lumma, have reportedly made a groundbreaking discovery…
Atomic Stealer | Threat Actor Spawns Second Variant of macOS Malware Sold on Telegram.

Recent weeks have seen a number of macOS-specific infostealers appear for sale in crimeware forums…
RHADAMANTHYS: THE “EVERYTHING BAGEL” INFOSTEALER.

What causes a man to wake up one day and say, “I’m going to build my own malware and go sell it to cybercriminals on the dark web”?
Rapid7 Observes Use of Microsoft OneNote to Spread Redline Infostealer and Qakbot Malware.

Rapid7 routinely conducts research into the wide range of techniques that threat actors use to conduct malicious activity…
Fake Update Utilizes New IDAT Loader To Execute StealC and Lumma Infostealers.

Recently, Rapid7 observed the Fake Browser Update lure tricking users into executing malicious binaries…
Overview of the Russian-speaking infostealer ecosystem: the logs.

This blog post aims at presenting the life cycle of logs, the cybercrime marketplaces dedicated to logs and the noticeable schemes…
macOS MetaStealer | New Family of Obfuscated Go Infostealers Spread in Targeted Attacks.

This year has seen an explosion of infostealers targeting the macOS platform. Throughout 2023…
An Avoidable Breach — FBI Hacker Leaks Sensitive Airbus Data.

A relatively unknown threat actor who goes by the alias “USDoD” posted a thread in which they offered the database of the FBI’s…
100,000 Hackers Exposed from Top Cybercrime Forums.

Using Hudson Rock’s cybercrime intelligence database, which consists of over 14,500,000 computers infected by info-stealing malware…
Prominent Threat Actor Accidentally Infects Own Computer with Info-Stealer.

Threat actor “La_Citrix” is known for hacking companies and selling access to their citrix/vpn/RDP servers or otherwise for selling info-stealer logs from computer infections…
Botnets & Info-Stealers (Part Ⅲ)

In this last part of a three part series, our teams summarize the major takeaways from our joint research and provide you with some actionable recommendations…
Botnets & Info-Stealers (Part Ⅱ)

In this second of a three blog post series, Cyrus and Hudson Rock reveal how the info-stealer threat looks from the hacker’s point of view…