BTC $63442.8276
ETH $3469.7477
BNB $414.4838
SOL $128.8578
XRP $0.6333
ADA $0.7553
DOGE $0.1556
AVAX $42.2817
DOT $9.6926
wstETH $4022.3454
TRX $0.1396
LINK $20.2249
WETH $3455.5461
MATIC $1.0912
UNI $12.3248
WBTC $63402.0644
BCH $454.1971
LTC $89.7149
IMX $3.2697
ICP $13.1197
FIL $10.0810
CAKE $3.2889
ETC $33.3804
LEO $4.7626
ATOM $12.4298
RNDR $7.5236
TON $2.6714
KAS $0.1683
HBAR $0.1120
INJ $39.9268
DAI $0.9998
OKB $57.5556
VET $0.0485
STX $3.0863
FDUSD $0.9998
WEMIX $2.8006
XLM $0.1364
NEAR $4.5218
PEPE $0.0000
XMR $146.1340
LDO $3.3155
GRT $0.3143
ARB $1.9894
THETA $2.3291
TIA $15.9776
ENS $21.4774
CRO $0.1387
BTC $63442.8276
ETH $3469.7477
BNB $414.4838
SOL $128.8578
XRP $0.6333
ADA $0.7553
DOGE $0.1556
AVAX $42.2817
DOT $9.6926
wstETH $4022.3454
TRX $0.1396
LINK $20.2249
WETH $3455.5461
MATIC $1.0912
UNI $12.3248
WBTC $63402.0644
BCH $454.1971
LTC $89.7149
IMX $3.2697
ICP $13.1197
FIL $10.0810
CAKE $3.2889
ETC $33.3804
LEO $4.7626
ATOM $12.4298
RNDR $7.5236
TON $2.6714
KAS $0.1683
HBAR $0.1120
INJ $39.9268
DAI $0.9998
OKB $57.5556
VET $0.0485
STX $3.0863
FDUSD $0.9998
WEMIX $2.8006
XLM $0.1364
NEAR $4.5218
PEPE $0.0000
XMR $146.1340
LDO $3.3155
GRT $0.3143
ARB $1.9894
THETA $2.3291
TIA $15.9776
ENS $21.4774
CRO $0.1387
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • Infostealer written in Go language attacks Windows-based computers

    Infostealer written in Go language gives attackers the potential to carry out cross-platform malicious operations

    A new stealthy malware capable of stealing information from browsers and cryptocurrency wallets has caught the attention of Trend Micro cybersecurity experts. The malware is called Bandit Stealer and is developed in the Go programming language, which hypothetically allows it to work on different platforms.

    So far, Bandit Stealer has only attacked Windows using the legitimate "runas.exe" command-line utility, which allows you to run programs as a different user with a different list of system permissions. The main goal of hackers when using "runas.exe" is to gain administrative access and bypass security measures to collect a large amount of data.

    “Using the runas.exe command, users can run programs as an administrator or any other user with appropriate rights, providing a more secure environment for performing critical applications or system tasks. This utility is especially useful in situations where the current user account does not have sufficient rights to execute a particular command or program,” Trend Micro said in a May 26 report.

    Bandit Stealer checks to see if it's running in a sandbox or virtual environment and then terminates a number of system processes to hide its presence on the infected computer. The malware also provides persistence on the target system by modifying the Windows registry.

    Bandit Stealer's malicious activity includes extracting personal and financial data stored in browsers and cryptocurrency wallets. The malware spreads through phishing emails containing a downloader file that opens a harmless Microsoft Word office document as a distraction, while the actual infection takes place in the background.

    Data collected from stealth programs can benefit operators in many ways: it can be used for identity theft, financial gain, data privacy breaches, credential brute force attacks, and account takeovers. The stolen information can also be sold to other actors and serve as the basis for subsequent attacks, which can range from targeted campaigns to extortion or ransomware attacks.

    Author DeepWeb
    Information security specialists revealed the identity of the Golden Chickens malware operator
    AceCryptor: a powerful weapon for cybercriminals to bypass detection and reverse engineering

    Comments 0

    Add comment