BTC $57054.0562
ETH $3243.0497
BNB $394.9600
SOL $108.4177
XRP $0.5865
stETH $3239.3493
ADA $0.6239
AVAX $39.2702
DOGE $0.0977
TRX $0.1428
wstETH $3750.7519
DOT $8.3691
LINK $19.0300
WETH $3348.6813
MATIC $1.0282
UNI $10.8579
WBTC $56903.9273
IMX $3.3452
ICP $13.0217
BCH $292.5040
LTC $74.0124
CAKE $3.1570
ETC $28.0992
LEO $4.3640
FIL $7.6578
KAS $0.1689
RNDR $7.2011
DAI $1.0000
ATOM $11.2097
HBAR $0.1082
INJ $40.1071
VET $0.0489
TON $2.1280
OKB $51.4855
FDUSD $0.9985
LDO $3.4670
STX $2.9465
XMR $135.8398
XLM $0.1230
ARB $1.8948
NEAR $3.9608
TIA $17.0031
WEMIX $2.3756
GRT $0.2795
ENS $22.1963
MKR $2154.9330
APEX $2.3329
BTC $57054.0562
ETH $3243.0497
BNB $394.9600
SOL $108.4177
XRP $0.5865
stETH $3239.3493
ADA $0.6239
AVAX $39.2702
DOGE $0.0977
TRX $0.1428
wstETH $3750.7519
DOT $8.3691
LINK $19.0300
WETH $3348.6813
MATIC $1.0282
UNI $10.8579
WBTC $56903.9273
IMX $3.3452
ICP $13.0217
BCH $292.5040
LTC $74.0124
CAKE $3.1570
ETC $28.0992
LEO $4.3640
FIL $7.6578
KAS $0.1689
RNDR $7.2011
DAI $1.0000
ATOM $11.2097
HBAR $0.1082
INJ $40.1071
VET $0.0489
TON $2.1280
OKB $51.4855
FDUSD $0.9985
LDO $3.4670
STX $2.9465
XMR $135.8398
XLM $0.1230
ARB $1.8948
NEAR $3.9608
TIA $17.0031
WEMIX $2.3756
GRT $0.2795
ENS $22.1963
MKR $2154.9330
APEX $2.3329
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • Infostealer written in Go language attacks Windows-based computers

    Infostealer written in Go language gives attackers the potential to carry out cross-platform malicious operations

    A new stealthy malware capable of stealing information from browsers and cryptocurrency wallets has caught the attention of Trend Micro cybersecurity experts. The malware is called Bandit Stealer and is developed in the Go programming language, which hypothetically allows it to work on different platforms.

    So far, Bandit Stealer has only attacked Windows using the legitimate "runas.exe" command-line utility, which allows you to run programs as a different user with a different list of system permissions. The main goal of hackers when using "runas.exe" is to gain administrative access and bypass security measures to collect a large amount of data.

    “Using the runas.exe command, users can run programs as an administrator or any other user with appropriate rights, providing a more secure environment for performing critical applications or system tasks. This utility is especially useful in situations where the current user account does not have sufficient rights to execute a particular command or program,” Trend Micro said in a May 26 report.

    Bandit Stealer checks to see if it's running in a sandbox or virtual environment and then terminates a number of system processes to hide its presence on the infected computer. The malware also provides persistence on the target system by modifying the Windows registry.

    Bandit Stealer's malicious activity includes extracting personal and financial data stored in browsers and cryptocurrency wallets. The malware spreads through phishing emails containing a downloader file that opens a harmless Microsoft Word office document as a distraction, while the actual infection takes place in the background.

    Data collected from stealth programs can benefit operators in many ways: it can be used for identity theft, financial gain, data privacy breaches, credential brute force attacks, and account takeovers. The stolen information can also be sold to other actors and serve as the basis for subsequent attacks, which can range from targeted campaigns to extortion or ransomware attacks.

    Author DeepWeb
    Information security specialists revealed the identity of the Golden Chickens malware operator
    AceCryptor: a powerful weapon for cybercriminals to bypass detection and reverse engineering

    Comments 0

    Add comment