
Lumma malware can allegedly restore expired Google auth cookies.
Session cookies are specific web cookies used to allow a browsing session to log in to a website’s services automatically…
Home » Infostealers » Page 4

Session cookies are specific web cookies used to allow a browsing session to log in to a website’s services automatically…

The Lumma information-stealing malware is now using an interesting tactic to evade detection by security software…

Recent weeks have seen a number of macOS-specific infostealers appear for sale in crimeware forums…

What causes a man to wake up one day and say, “I’m going to build my own malware and go sell it to cybercriminals on the dark web”?

Rapid7 routinely conducts research into the wide range of techniques that threat actors use to conduct malicious activity…

Recently, Rapid7 observed the Fake Browser Update lure tricking users into executing malicious binaries…

This blog post aims at presenting the life cycle of logs, the cybercrime marketplaces dedicated to logs and the noticeable schemes…

This year has seen an explosion of infostealers targeting the macOS platform. Throughout 2023…

Using Hudson Rock’s cybercrime intelligence database, which consists of over 14,500,000 computers infected by info-stealing malware…

Threat actor “La_Citrix” is known for hacking companies and selling access to their citrix/vpn/RDP servers or otherwise for selling info-stealer logs from computer infections…

In this last part of a three part series, our teams summarize the major takeaways from our joint research and provide you with some actionable recommendations…

In this second of a three blog post series, Cyrus and Hudson Rock reveal how the info-stealer threat looks from the hacker’s point of view…

The Ouroboros of Cybercrime: ClickFix & Infostealers Hudson Rock Threat Intelligence The Ouroboros of Cybercrime From Victim to Vector: How Infostealers Turn Legitimate Businesses into

The Industrialization of “ClickFix”: Inside ErrTraffic – Hudson Rock The Industrialization of “ClickFix”: Inside ErrTraffic Author: Hudson Rock Threat Intelligence Team | Date: December 28,

WIRED Database Leaked – Condé Nast Breach Analysis Incident Analysis Report WIRED Database Leaked: 40 Million Record Threat Looms for Condé Nast A comprehensive investigation