ESET Latinoamérica(@ESETLA) 's Twitter Profile Photo

🔍 Descubre el mundo de los Infostealers: 5 tipos de malware que acechan tus datos. ¿Qué es un infostealer y cómo protegerte?

💻 ¡Lee nuestro artículo para conocer más sobre estas amenazas cibernéticas! welivesecurity.com/es/malware/inf…

🔍 Descubre el mundo de los Infostealers: 5 tipos de malware que acechan tus datos. ¿Qué es un infostealer y cómo protegerte? 

💻 ¡Lee nuestro artículo para conocer más sobre estas amenazas cibernéticas! welivesecurity.com/es/malware/inf…
account_circle
Vicer Solutions(@vicersolutions) 's Twitter Profile Photo


: 5 tipos de que roban información.
Explicamos qué es un infostealer, cuáles son los tipos más comunes y sus principales características:
welivesecurity.com/es/malware/inf… twitter.com/messages/compo…

#Ciberseguridad
#Infostealers: 5 tipos de #malware que roban información. 
Explicamos qué es un infostealer, cuáles son los tipos más comunes y sus principales características: 
welivesecurity.com/es/malware/inf… twitter.com/messages/compo…
account_circle
Threat ResQ™(@ThreatResq) 's Twitter Profile Photo

A threat actor has been using a content delivery network cache to store information-stealing malware in an ongoing campaign targeting systems U.S., the U.K., Germany, and Japan.

bleepingcomputer.com/news/security/…

account_circle
Virus Bulletin(@virusbtn) 's Twitter Profile Photo

Kandji's Adam Kohler & Christopher Lopez analyse the Cuckoo macOS malware, which behaved like a cross between an infostealer and spyware. blog.kandji.io/malware-cuckoo…

Kandji's Adam Kohler & Christopher Lopez analyse the Cuckoo macOS malware, which behaved like a cross between an infostealer and spyware. blog.kandji.io/malware-cuckoo…
account_circle
Ayushman Kaul(@KaulAyushman) 's Twitter Profile Photo

Malware Masquerades as News on Social Media - Unveiling the deceptive tactics employed by a Coordinated network to disguise pernicious Infostealer malware as traditional media coverage of the
resolver.com/blog/ukraine-w…

Malware Masquerades as News on Social Media -  Unveiling the deceptive tactics employed by a Coordinated network to disguise pernicious Infostealer malware as traditional media coverage of the #RussiaUkraineWar #Investigation
resolver.com/blog/ukraine-w…
account_circle
Cybersecurity Help(@Cybershelp) 's Twitter Profile Photo

cybersecurity-help.cz/blog/3959.html

An ongoing cyber campaign targets victims across multiple countries with the Cryptbot, LummaC2, and Rhadamanthys infostealer malware variants

cybersecurity-help.cz/blog/3959.html

An ongoing cyber campaign targets victims across multiple countries with the Cryptbot, LummaC2, and Rhadamanthys infostealer malware variants

#CiscoTalos #malware #CoralRaider
account_circle
Autumn Good(@autumn_good_35) 's Twitter Profile Photo

DPAPI関連の監査ログを有効にすることでInfostealerなどによるCookieやパスワードの盗難を追跡しやすくなるようです。

Google Online Security Blog: Detecting browser data theft using Windows Event Logs
security.googleblog.com/2024/04/detect…

account_circle
Ayushman Kaul(@KaulAyushman) 's Twitter Profile Photo

These tactics, including the use of misleading thumbnail images, URL shorteners, targeted hashtags and evocative language were designed to lure users into clicking on the malicious links, leading to the infection of their browsers with malware.

These tactics, including the use of misleading thumbnail images, URL shorteners, targeted hashtags and evocative language were designed to lure users into clicking on the malicious links, leading to the infection of their browsers with #infostealer malware.
account_circle
Ciberseguridad al día(@DKCiberNews) 's Twitter Profile Photo

▶️Infostealers: malware que roba información

▶️Suelen buscar datos de tarjetas de crédito y credenciales de todo tipo de cuentas: desde redes sociales, correo electrónico y aplicaciones en general


blog.elhacker.net/2024/04/infost…

account_circle
Debra Baker, CISSP CCSP GRCP(@deb_infosec) 's Twitter Profile Photo

Discord dismantles Spy.pet site that snooped on millions of users: ALSO: Infostealer spotted hiding in CDN cache, antivirus update hijacked to deliver virus, and some critical vulns

Updated - Infosec in brief … dlvr.it/T69sQx

Discord dismantles Spy.pet site that snooped on millions of users: ALSO: Infostealer spotted hiding in CDN cache, antivirus update hijacked to deliver virus, and some critical vulns

Updated - Infosec in brief … dlvr.it/T69sQx #cybersecurity #infosec
account_circle
Sekoia.io(@sekoia_io) 's Twitter Profile Photo

🚨 Sekoia.io analysts investigated the (not so) new infostealer, named Stealer, advertised on Russian-speaking underground forums by SheldIO.

Our technical analysis revealed that ACR Stealer is a new, updated variant of the older Stealer.

⬇️

🚨 @sekoia_io analysts investigated the (not so) new infostealer, named #ACR Stealer, advertised on Russian-speaking underground forums by SheldIO.

Our technical analysis revealed that ACR Stealer is a new, updated variant of the older #GrMsk Stealer.

⬇️
account_circle
L0Psec(@L0Psec) 's Twitter Profile Photo

Alright here’s a new blog post for a new macOS malware by Adam Kohler and I!

This was a fun one to reverse: stripped, encoded strings, persistence, and more :)

Enjoy!!

blog.kandji.io/malware-cuckoo…

account_circle
Global Cyber Threat Intel(@cipherstorm) 's Twitter Profile Photo

Security in the AI Sector: Understanding Infostealer Exposures and Corporate Risks: As Constella analyzed in the first part of this blog series, which focused on exhibitions in the emerging AI sector, we’ll delve deeper into the risks and vulnerabilities… securityboulevard.com/2024/05/securi…

Security in the AI Sector: Understanding Infostealer Exposures and Corporate Risks: As Constella analyzed in the first part of this blog series, which focused on exhibitions in the emerging AI sector, we’ll delve deeper into the risks and vulnerabilities… securityboulevard.com/2024/05/securi…
account_circle
Adam Kohler(@AdamJKohler) 's Twitter Profile Photo

Last week we identified another new malware “Cuckoo” for that has Spyware and Infostealer capabilities.

I am proud of the work L0Psec and I did to get this out!

account_circle
The Puchi Herald(@thepuchiherald) 's Twitter Profile Photo

Proofpoint Threat Insight has found that TA547 has been using an info stealer called Rhadamanthys to get its hand on companies' important financial data.

It involves a PowerShell script suspected to have been generated by large language models ( ). bit.ly/3JyYKQL

account_circle
Sekoia.io(@sekoia_io) 's Twitter Profile Photo

SheldIO has previously sold Stealer, Roca Loader and another unnamed private infostealer, available to only a limited number of affiliates, that we link to GrMsk Stealer.

Here is a timeline of activities attributed to SheldIO between 2022 and 2024.

⬇️

SheldIO has previously sold #AcridRain Stealer, Roca Loader and another unnamed private infostealer, available to only a limited number of affiliates, that we link to GrMsk Stealer.

Here is a timeline of activities attributed to SheldIO between 2022 and 2024.

⬇️
account_circle
ESET Venezuela(@eset_ve) 's Twitter Profile Photo

El término infostealer se utiliza para agrupar a distintos tipos de malware que tienen capacidad de robar información. Suelen buscar datos de tarjetas de crédito y credenciales de todo tipo de cuentas bit.ly/3y2m5rh vía ESET Latinoamérica

El término infostealer se utiliza para agrupar a distintos tipos de malware que tienen capacidad de robar información. Suelen buscar datos de tarjetas de crédito y credenciales de todo tipo de cuentas bit.ly/3y2m5rh vía @ESETLA #malware #ciberserguridad #infostealer
account_circle
Patrick Wardle(@patrickwardle) 's Twitter Profile Photo

New from Chris (L0Psec) of Kandji
'[macOS] Malware: Cuckoo Behaves Like Cross Between Infostealer & Spyware': blog.kandji.io/malware-cuckoo… 🍎👾👀

account_circle