Cybersecurity

New RedLine Stealer Variant Disguised as Game Cheats Using Lua Bytecode for Stealth

A new information stealer has been found leveraging Lua bytecode for added stealth and sophistication, findings from McAfee Labs reveal. The cybersecurity firm has assessed it to be a variant of a known malware called RedLine Stealer owing to the fact that the command-and-control (C2) server IP address has been previously identified as associated with […]

Cybersecurity

Hackers Target macOS Users with Malicious Ads Spreading Stealer Malware

Mar 30, 2024NewsroomMalware / Cryptocurrency Malicious ads and bogus websites are acting as a conduit to deliver two different stealer malware, including Atomic Stealer, targeting Apple macOS users. The ongoing infostealer attacks targeting macOS users may have adopted different methods to compromise victims’ Macs, but operate with the end goal of stealing sensitive data, Jamf […]

Cybersecurity

Snake, a new Info Stealer spreads through Facebook messages

Snake, a new Info Stealer spreads through Facebook messages Pierluigi Paganini March 07, 2024 Threat actors are using Facebook messages to spread a Python-based information stealer dubbed Snake, researchers warn. Cybereason researchers warn that threat actors are utilizing Facebook messages to spread the Snake malware, a Python-based information stealer. The researchers noticed that the threat […]

Cybersecurity

Snake, a new Info Stealer spreads through Facebook messages

Snake, a new Info Stealer spreads through Facebook messages Pierluigi Paganini March 07, 2024 Threat actors are using Facebook messages to spread a Python-based information stealer dubbed Snake, researchers warn. Cybereason researchers warn that threat actors are utilizing Facebook messages to spread the Snake malware, a Python-based information stealer. The researchers noticed that the threat […]

Cybersecurity

Data Insights on AgentTesla and OriginLogger Victims | Bitsight

Key takeaways AgentTesla (also known as OriginLogger) remains a prevalent commodity stealer, being daily distributed, mainly via email attachments;  The primary method for exfiltrating data remains the usage of mail servers, although Telegram utilization is increasing;  Available infection telemetry suggests that the most targeted countries are the United States, China and Germany. Malware as a […]

Cybersecurity

Researchers Disclose New Lumma Stealer Campaign Distributed via YouTube | Cyware Hacker News

FortiGuard Labs researchers recently encountered a new Lumma Stealer campaign that leverages YouTube channels for propagation. The attackers are strategically compromising YouTube accounts and uploading videos that pretend to offer cracked software for legitimate video editing tools such as Vegas Pro. Modus operandi According to researchers, these videos contain embedded malicious URLs, enticing users to […]

Cybersecurity

Behind the Scenes: JaskaGO’s Coordinated Strike on macOS and Windows

Executive summary In recent developments, a sophisticated malware stealer strain crafted in the Go programming language has been discovered by AT&T Alien Labs, posing a severe threat to both Windows and macOS operating systems. As of the time of publishing of this article, traditional antivirus solutions have low or even non-existent detection rates, making it […]