NEW CARDING CHAT IN TELEGRAM

RECORDSTEALER's Legacy: The Ghost of the Past in Today's Threats

Friend

Professional
Messages
2,604
Reputation
194
Reaction score
813
Points
113
Even old threats can suddenly escalate.

Recently, malware detection has become a key element of ensuring cybersecurity. One example of such a threat is the RECORDTEALER malware, also known as the RecordBreaker and the Raccoon Stealer V2. This infostealer, written in C, specialized in stealing sensitive information such as credit card details, passwords, cookies, and cryptocurrency wallets.

RECORDSTEALER was actively distributed through malicious ads and downloads of cracked programs, while masquerading as legitimate software. The malware was downloaded as a password-protected archive, and the user entered the password to unpack it. After successfully running the malware, it transmitted system information to the command-and-control (C2) server using encrypted RC4 requests. Among the collected data were the device's unique ID, username, and other parameters needed for further attacks.

Although RECORDSTEALER's activity ceased after the arrest of its creator and the blocking of the infrastructure, the tactics used in these attacks are still used in modern infostealers. Cybercriminals continue to use propagation methods through cracked programs, as well as disguise their malware as legitimate software, which poses a serious threat to users.

The malware scenario involves collecting and transmitting data from infected systems. RECORDSTEALER actively collected information from Google Chrome and Mozilla Firefox browsers, including stored passwords, credit card details and cookies. In addition, it could steal cryptocurrency wallet data, take screenshots of the desktop, and collect files related to applications such as Telegram and Discord.

Interestingly, many of the techniques used in RECORDSTEALER continue to be found in other infostealers such as VIDAR and STEALC. This highlights the importance of monitoring malware activity, as even minor changes to the code can make it difficult to detect.

To combat such threats, various detection mechanisms are used, including monitoring suspicious archives and activity in folders with least privileges. Identifying early signs of infection, such as malicious file creation or suspicious network requests, helps you respond to threats in a timely manner and minimize the impact of a data breach.

Source
 
Top