Remove 2012 Remove Data collection Remove Passwords
article thumbnail

New Version of Meduza Stealer Released in Dark Web

Security Affairs

On Christmas Eve, Resecurity’s HUNTER unit spotted the author of perspective password stealer Meduza has released a new version (2.2). Under Christmas tree you can find great gifts such as significant improvements of user interface (panel), modal windows on loading and expansion of data collection objects.

article thumbnail

A Deep Dive Into the Residential Proxy Service ‘911’

Krebs on Security

The website’s copyright suggests the ExE Bucks affiliate program dates back to 2012. All VPN providers claim to prioritize the privacy of their users, but many then go on to collect and store all manner of personal and financial data from those customers. “all promotion methods allowed”). ”

VPN 351
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

Company Sector Year Status Isovalent Cloud security 2020 Private Illumio Cloud security 2015 Private SignalFx Monitoring 2015 Acquired: Splunk CipherCloud Cloud security 2012 Acquired: Lookout Lookout Mobile security 2011 Private. Mimecast Email security 2012 Nasdaq: MIME. Accel Investments. a16z Investments. Bessemer Venture Partners.

article thumbnail

Alleged FruitFly malware creator ruled incompetent to stand trial

Malwarebytes

In 2012, as a senior soon to graduate with a physics degree, he worked on a project with faculty member Robert W. While at CWRU, he was accused of “cracking passwords” on a CWRU network. The FBI found more than 20 million files collected from victim machines on hardware confiscated from Durachinsky’s home.

Malware 101
article thumbnail

Head Mare and Twelve join forces to attack Russian entities

SecureList

Our telemetry data revealed domain controllers still running Microsoft Windows Server 2012 R2 Server Standard x64 or, as in the aforementioned incidents, Microsoft Exchange Server 2016 used for email. Data Collection and Exfiltration Another new tool in Head Mare’s arsenal was a script running wusa.exe.

article thumbnail

StripedFly: Perennially flying under the radar

SecureList

During these scans, it collects a range of sensitive information from all active users. This information includes website login usernames and passwords, as well as personal autofill data such as name, address, phone number, company, and job title. This is the only task that works in the Linux version of the malware. 8, 15.0.0.0/8,

Malware 144
article thumbnail

APT trends report Q2 2024

SecureList

The backdoor hooks the password authentication function, which allows the attacker to use any username/password to log in to the infected server without any further checks. Middle East Gaza Cybergang has been active since at least 2012, targeting the Middle East and North Africa.