NEW CARDING CHAT IN TELEGRAM

stealer

  1. Man

    Writing a stealer on C

    Smile at this world, stay connected! In this article we will analyze the process of writing a simple info-stealer in C. Let's move on to practice! We collect information So, info-stealer is a type of malware, which, as the name suggests, is designed to collect information from infected...
  2. Man

    The stealer was distributed for a year through a legal software repository under the guise of tools for working with neural networks

    Experts from Kaspersky GReAT (Kaspersky Lab's Global Research and Analysis Team) discovered an attack on the software supply chain that lasted for almost a year. Through the Python Package Index (PyPI) software repository, attackers distributed malicious packages under the guise of tools for...
  3. A

    Ada Stealer 100% FUD | Cookies | Passwords | Crypto | Telegram

    Ada is a new undetected stealer that is now public after one year of private usage. For now everything is managed on telegram but a custom panel is already being developed. Every stub is heavily obfuscated and all groupchat links are protected by a server ensuring that no one will be able to...
  4. Man

    Raccoon Stealer creator broken: hacker pleaded guilty

    The Raccoon Stealer has received an upgrade to jail. Mark Sokolovsky has pleaded guilty to participating in the Raccoon Stealer malware distribution campaign. Sokolovsky and his co-conspirators distributed the Raccoon Stealer on a MaaS (Malware-as-a-Service) model, renting the software for $75...
  5. Man

    Hackers Have Implemented AI in the Rhadamanthys Stealer: What Are Their Goals?

    Criminals are actively mastering new techniques, creating non-standard malware. Researchers from Recorded Future have discovered that the threat actors behind the Rhadamanthys malware have added new artificial intelligence (AI)-based capabilities. A new feature called Seed Phrase Image...
  6. Friend

    RECORDSTEALER's Legacy: The Ghost of the Past in Today's Threats

    Even old threats can suddenly escalate. Recently, malware detection has become a key element of ensuring cybersecurity. One example of such a threat is the RECORDTEALER malware, also known as the RecordBreaker and the Raccoon Stealer V2. This infostealer, written in C, specialized in stealing...
  7. Friend

    Ailurophile Stealer: New Data Stealer Spreads Lightning Fast Among Cyber Villains

    A three-day trial period and a referral system do their job. In August of this year, researchers from Cyfirma discovered a new piece of malware in cyberspace aimed at stealing sensitive user data, such as passwords, browsing history and saved cookies. The information thief was named Ailurophile...
  8. Man

    Cookie Stealer

    How to build a basic Cookie Stealer. A cookie stealer is used to steal the SESSION data or cookie information such as login details of any unsuspecting victim. Once the link is visited, the cookie data of the user is taken and stored externally. They are then redirected to another page without...
  9. 0xe1

    MacOS Stealer Banshee Stealer - x86_64 ARM64

    ⚠️Escrow ONLY⚠️ Hello everyone! We are glad to present you our new product - macOS stealer "Banshee Stealer". Extensive functionality, beautiful design, speed - all this is "Banshee Stealer". VIDEOS in TELEGRAM CHANNEL!!! (TELEGRAM CHANNEL: https://t.me/stealer_banshee) VIDEOS in TELEGRAM...
  10. Friend

    An Ancient Evil Has Awakened: Cthulhu Stealer Steals Crypto Assets on macOS

    How the good old GTA IV served as bait to disguise a new virus. Researchers from Cado Security have discovered a new piece of malware targeting users of the macOS operating system. Dubbed the 'Cthulhu Stealer', this malware is designed to collect a wide range of data from Apple devices...
  11. Friend

    AMOS Stealer: the updated version of the malware is aimed at your cryptocurrency

    Researchers link the attacks to a mysterious group called Crazy Evil. Security researchers at Moonlock have discovered a new wave of activity in the AMOS malware, also known as Atomic Stealer. Attackers allegedly linked to the hacker group Crazy Evil spread malware through fake advertising...
  12. Carding Forum

    DeerStealer: Setting up 2FA has never been so risky

    How installing Google Authenticator from the official website deprives users of privacy. Cybersecurity specialists from Malwarebytes discovered a new scheme for distributing malicious software. Attackers use Google Ads to pass off malware as the official Google Authenticator app, while using...
  13. Carding Forum

    Passwords, money, data: Mint Stealer goes on a cyber hunt

    A fresh digital predator bypasses security and is encrypted against detection. Cyfirma experts have released a report on the Mint Stealer malware operating on the "malware as a service" (MaaS) model. This virus specializes in stealing confidential data and uses advanced methods to bypass...
  14. Carding Forum

    Stealer, how to choose?

    Again, I won't give any links - there's little point in that. I'll tell you how to choose the best option for yourself, what to pay attention to, and how not to screw up with a purchase, and whether to buy at all? Stealers So, there are many stealers on the market. From well-known to not so...
  15. Tomcat

    Stealer's crypt: Learning to crypt correctly.

    So, meet - a bloody callus, a purulent abscess and a headache for everyone who works with logs, traffic and installations - crypt files What you will learn from this article: What is a file crypt, what is included there, what is not included, and what is completely different. Why 95% of crypto...
  16. Tomcat

    Киберпреступники используют бесплатные программные приманки для развертывания Hijack Loader и Vidar Stealer

    Злоумышленники заманивают ничего не подозревающих пользователей бесплатными или пиратскими версиями коммерческого программного обеспечения для доставки загрузчика вредоносного ПО под названием Hijack Loader, который затем внедряет средство для кражи информации, известное как Vidar Stealer...
  17. chushpan

    Malware. Sniffer. Stealer. Viruses.

    Hello Anonymous. Where do cards with balances come from and why doesn’t it work out for you? The first answer is outrageously simple: they steal or buy. More often than not, it’s the latter, because stealing data is a tricky task and not everyone is capable of it. What is a stealer? What is a...
  18. Tomcat

    Осторожно: поддельные обновления браузера распространяют вредоносное ПО BitRAT и Lumma Stealer

    Поддельные обновления веб-браузера используются для доставки троянов удаленного доступа (RATs) и вредоносных программ для кражи информации, таких как BitRAT и Lumma Stealer (он же LummaC2). "Поддельные обновления браузера были причиной многочисленных заражений вредоносными программами, в том...
  19. Father

    Новый вариант RedLine Stealer, замаскированный под игровые читы с использованием байт-кода Lua для скрытности

    Был обнаружен новый похититель информации, использующий байт-код Lua для дополнительной скрытности и сложности, свидетельствуют результаты исследований McAfee Labs. Компания по кибербезопасности оценила его как вариант известной вредоносной программы под названием RedLine Stealer из-за того...
  20. Father

    Фишинговая атака TA547 поражает немецкие фирмы Rhadamanthys Stealer

    Злоумышленник, отслеживаемый как TA547, нацелился на десятки немецких организаций с помощью похитителя информации под названием Rhadamanthys в рамках фишинг-кампании, посвященной счетам-фактурам. "Исследователи впервые заметили, что TA547 использует Rhadamanthys, средство для кражи информации...
Top