stealers

  1. Man

    Stealing without noise and dust: how stealers work and why they are dangerous

    Stealers are one of the most common and insidious types of viruses. They can deceive antiviruses, escape from the sandbox and delete themselves from the victim's device. At the same time, an intruder who wants to steal information does not have to be a genius hacker - it is enough to simply rent...
  2. Friend

    Cookie hunt: infostealers have learned to bypass encryption in Chrome 127

    Digital thieves are celebrating their victory over a new security feature. Developers of popular infostealers have told customers that they have learned how to bypass Chrome's App-Bound Encryption feature and collect authentication cookies that were previously returned encrypted. A new...
  3. Carding Forum

    Spam. Fat traffic for stealers etc.

    So, friends, it's no secret that the world is currently in a rather difficult situation in every sense, a pandemic, a virus, the economy has gone to hell, etc. There's suddenly nothing to do, or even worse, hands are scattered and they themselves do not know where to stick themselves in such a...
  4. Tomcat

    The most active stealers of 2024 have been named

    Analysts at Kaspersky Lab's Global Threat Research and Analysis Center have listed the stealers that have been most active since the beginning of 2024. According to the study, these included Acrid, ScarletStealer and SYS01. Acrid was first discovered in December 2023. Interestingly, it is...
  5. Tomcat

    Hackers disguised as defenders: Avast, Bitdefender and Malwarebytes sites distribute stealers

    How scammers make money from the popularity of antivirus programs. Cybercriminals use fake sites that mimic the sites of Avast, Bitdefender, and Malwarebytes to distribute infostilers for Android and Windows. Trellix specialists told about the new campaign in their report. Trellix has...
  6. Father

    Stealers disguised as legitimate software were found on GitHub

    Cybercriminals have launched a campaign in which they are trying to disguise malware as legitimate software on the GitHub portal. This was stated by information security researchers from Recorded Future. It is known that hackers were operating from the territory of the CIS, and Atomic macOS...
  7. Mutt

    Keyloggers and stealers

    The article is presented for informational purposes only and does not call for action! In this article, we will raise the issue of keyloggers and stealers. This is a fairly simple way to get data if you have access to the device or to the location of the computer. It is also possible to carry...
Top