stealer

Infekcje szkodliwym oprogramowaniem typu infostealer

Przestępcy próbują doprowadzić do infekcji komputera ofiary wszelkimi możliwymi sposobami. Bardzo częstym wektorem ataku są masowo wysyłane emaile zawierające złośliwe załączniki, które mają zostać otworzone i uruchomione przez ofiarę.




stealer

Life on a crooked RedLine: Analyzing the infamous infostealer’s backend

Following the takedown of RedLine Stealer by international authorities, ESET researchers are publicly releasing their research into the infostealer’s backend modules




stealer

Catwoman. Soulstealer : the graphic novel / based on the novel written by Sarah J. Maas ; adapted by Louise Simonson ; illustrated by Samantha Dodge with Carl Potts and Brett Ryans ; colors by Shari Chankhamma ; letters by Saida Temofonte.

Selina Kyle returns to Gotham City as new socialite Holly Vanderhees, but she needs to outsmart rival Batwing to rise to the top of the city's criminal underbelly.




stealer

TrojanSpy.MSIL.REDLINESTEALER.YXBDM

Threat type: Trojan Spy

Aliases: MSIL/Kryptik.AAHQ!tr(FORTINET); Trj/GdSda.A(PANDA)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: High

Overview:

This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It executes commands from a remote malicious user, effectively compromising the affected system. It connects to a website to send and receive information.




stealer

TrojanSpy.MSIL.REDLINESTEALER.YXBDN

Threat type: Trojan Spy

Aliases: a variant of MSIL/Kryptik.AAHN trojan(NOD32); PWS-FCXD!F291EAD13EAD(NAI)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: High

Overview:

This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It executes commands from a remote malicious user, effectively compromising the affected system. It connects to a website to send and receive information.





stealer

Getaways: Pretty Portloe is a scene-stealer with star quality



THERE'S a little village in Cornwall that's making all the right movies. And it's not Port Isaac, which is rightly famous for ITV's Doc Martin and BBC's period drama Poldark. No, this is Portloe, which can lay claim to being the forerunner when, back in 1949, Disney chose the tiny fishing village to film scenes for its celluloid masterpiece Treasure Island.




stealer

Rootstealer X11 Code Executor

Rootstealer is a program to detect when a linux user opens a terminal with root and it injects intrusive commands in the terminal with X11.




stealer

Best Buy Gift Cards, USB Drive Used To Spread Infostealer





stealer

Hermit bandit's revenge, or, The league of the fur stealers




stealer

The Bradys and the gypsies; or, Chasing the child stealers