Big Game Hunting — Vidar Server Infrastructure in Germany
Vidar steals information including login credentials, browser history, cookies and other data and sends it all back to the operator…
Vidar steals information including login credentials, browser history, cookies and other data and sends it all back to the operator…
A detailed blog on Analysis of the Global Malware Trend: Exploiting Undocumented OAuth2 Functionality to Regenerate Google Service Cookies Regardless of IP or Password Reset…
Installation of Epsilon infostealer enabled exfiltration of browser-stored data, including passwords, credit cards, and cookies and more…
The threat landscape meets a new player – Rugmi Loader. This threat specializes in spreading spyware, and is in fact capable of delivering any malware type…
Pure Logs Stealer first appeared on hacking forums at the end of October 2022. The stealer is developed by a malware developer…
During the summer of 2023, cyberattacks rose significantly, according to data from the new quarterly BlackBerry Global Threat Intelligence Report, November 2023 edition…
The 8220 gang has been leveraging an old Oracle WebLogic Server vulnerability (CVE-2020-14883) to distribute malware, the Imperva Threat Research team has found…
“Meta” is a Greek-origin prefix that means after, beyond, or at a higher level. The same vision of this word is shared between Mark Zuckerberg…
STEALC uses a unique log exfiltration by parts on exe builds. This type of communication between build and server panel…
Amadey is a malware known as a “loader”: its main functionality is to load other payloads for all or specifically targeted computers…
Vidar is one of the top 5 stealers in the market but their users are doing a good job hiding their activity…
Meduza is one of the youngest malware projects that I’ve seen on the market. It is kind of active at the moment…
Summary So far, 2024 really has been the year of the infostealer when it comes to macOS malware. Families like AtomicStealer, Cuckoo, and CloudJump are
Introduction Hudson Rock recently shed light on how a compromised Citrix account without MFA was potentially used to deploy a devastating ransomware attack on Change Healthcare. This
This article aims to shed light on the identity behind a massive Discord spying tool and raise concerns about the possibility of private Discord data
Stay informed with the latest insights in our Infostealers weekly report. Explore key findings, trends and data on info-stealing activities.