Data Exploration – Shedding Light on Sanctioned Entities (Hudson Rock)
Hudson Rock’s data exploration capabilities allow for seamless analysis of massive amounts of assets associated with Infostealer infections. In this example, we analyze all domains associated with companies sanctioned by OFAC and even discover companies that should be sanctioned but aren’t. Full blog – https://www.infostealers.com/article/infostealer-malware-infections-shed-light-on-sanctioned-entities-reveals-new-targets-for-global-crackdown/ Hudson Rock’s database, containing tens of millions of infected computers […]
Anatomy of a Lumma Stealer Attack via Fake CAPTCHA Pages
As of late August 2024, attackers have been using fraudulent “human verification” pages to trick users into executing a malicious PowerShell script. This blog post will explore the full attack vector, detailing how the malware is delivered, executed, and the indicators of compromise (IOCs) involved. Lumma Stealer is designed to exfiltrate sensitive information such as […]
The Dark Truth About Infostealers: Why You Should Not Always Trust Antivirus with Leonid Rozenberg
Check out our latest interview featuring Leonid Rozenberg, where he speaks with Boris Agranovich on the Risk Management Show about the growing threat of Infostealers. Tune in on YouTube or Spotify to discover why businesses of all sizes across every industry should be concerned, explore common malware delivery methods, and debunk the TOP 5 misconceptions […]
How to Check if Your Email Has Been Compromised by an Infostealer
Our email accounts are essential repositories of financial and personal data in the digital age. Regretfully, this renders them extremely attractive targets for hackers employing malicious software referred to as infostealers. These sneaky applications are made to stealthily collect private data from compromised devices, including financial information, login credentials, and even keystrokes. What is an […]
Infostealer Malware Infections Shed Light on Sanctioned Entities & Revealing New Targets for Global Crackdown
Hudson Rock’s continued research explores how Infostealer infections can provide insights into sanctioned entities and identify new opportunities for sanctions. TL;DR (read the research — don’t be lazy)— Sanctioned companies have infected employees that can provide unrivaled insights to law enforcement, and Hudson Rock researchers were able to discover a company that should be sanctioned based on […]
Beyond the wail: deconstructing the BANSHEE infostealer
Preamble In August 2024, a novel macOS malware named “BANSHEE Stealer” emerged, catching the attention of the cybersecurity community. Reportedly developed by Russian threat actors, BANSHEE Stealer was introduced on an underground forum and is designed to function across both macOS x86_64 and ARM64 architectures. This malware presents a severe risk to macOS users, targeting […]
Unmasking Styx Stealer: How a Hacker’s Slip Led to an Intelligence Treasure Trove
Key takeaways Introduction In the shadowy world of cybercrime, even the most cunning hackers can make blunders that expose their operations. In this article CPR describes the discovery of Styx Stealer, a new malware variant derived from the notorious Phemedrone Stealer. Our investigation revealed critical missteps by the developer of Styx Stealer, including a significant […]
Stealthy phishing attack uses advanced infostealer for data exfiltration
Phishing attacks featuring an advanced, stealthy technique designed to exfiltrate a wide range of sensitive information have been observed by Barracuda threat analysts. The technique involves a sophisticated infostealer malware able to collect PDF files and directories from most folders, as well as browser information such as session cookies, saved credit card details, bitcoin-related extensions, web history, and […]
Tusk: unraveling a complex infostealer campaign
Kaspersky Global Emergency Response Team (GERT) has identified a complex campaign, consisting of multiple sub-campaigns orchestrated by Russian-speaking cybercriminals. The sub-campaigns imitate legitimate projects, slightly modifying names and branding and using multiple social media accounts to increase their credibility. In our analysis we observed that all the active sub-campaigns host the initial downloader on Dropbox. This […]
Infostealer Investigation Module – Analyzing Stolen Files (Hudson Rock)
Hudson Rock’s Infostealer Investigation Module provides cybersecurity professionals the ability to investigate all the data captured from an Infostealer infection of employees and customers at their organizations. Hudson Rock’s database, with tens of millions of computers infected worldwide, helps cybersecurity and law enforcement customers with their investigations. To learn more, visit www.hudsonrock.com/cavalier
Approaching Stealers Devs : A Brief Interview With AMOS (Atomic macOS Stealer)
To completely understand what’s going on in a market that has been growing in the last years I found mandatory to know which players are dominating it. Always remember that behind every user of the Internet there is another human like you, so if you can be kind enough to reach them and they agree, […]
Meet the Top 5 Threat Actors Exploiting Infostealers Data to Breach Companies
As Infostealers become increasingly favored by cybercriminals and hacking groups as a primary method for breaching companies, it’s crucial to stay informed about the key players leveraging these tools. In this article, we spotlight the top five hackers who are using Infostealers to infiltrate companies, providing insights into their tactics and the evolving landscape of […]