![](https://www.infostealers.com/wp-content/uploads/2024/04/3.jpg)
Redline Stealer: A Novel Approach
A new packed variant of the Redline Stealer trojan was observed in the wild, leveraging Lua bytecode to perform malicious behavior.McAfee telemetry data shows this
Home » Analysis
A new packed variant of the Redline Stealer trojan was observed in the wild, leveraging Lua bytecode to perform malicious behavior.McAfee telemetry data shows this
In ongoing efforts to monitor and analyze emerging cyber threats, Morphisec Threat Labs has recently turned its focus to Chae$ 4.1, an update to the
This method can be applied to multiple other C2 servers that we come across on a daily basis to check for any security misconfigurations…
A ZIP/LNK payload and, with some luck, we will end up identifying the infostealer that is being dropped and its source code…
In the past few months, the Telegram clicker game Hamster Kombat has taken the world of cryptocurrency game enthusiasts by storm. Even though the gameplay,
Key Points Introduction Threat actors continually evolve their tactics to stay ahead of detection. Traditional methods of malware distribution via emails containing malicious attachments are
American cybersecurity company KnowBe4 says a person it recently hired as a Principal Software Engineer turned out to be a North Korean state actor who
Stay informed with the latest insights in our Infostealers weekly report. Explore key findings, trends and data on info-stealing activities.