article thumbnail

Lumma/Amadey: fake CAPTCHAs want to know if you’re human

SecureList

Armed with BitLocker To Go, the attackers manipulate the registry, primarily to create the branches and keys that the Trojan needs to operate: That done, Lumma, again using the utility, searches the victim’s device for files associated with various cryptocurrency wallets and steals them: Then, the attackers view browser extensions related to (..)

Adware 129
article thumbnail

Happy 13th Birthday, KrebsOnSecurity!

Krebs on Security

You just knew 2022 was going to be The Year of Crypto Grift when two of the world’s most popular antivirus makers — Norton and Avira — kicked things off by installing cryptocurrency mining programs on customer computers. A single bitcoin is trading at around $45,000.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Accused ‘Raccoon’ Malware Developer Fled Ukraine After Russian Invasion

Krebs on Security

Justice Department , FBI agents have identified more than 50 million unique credentials and forms of identification (email addresses, bank accounts, cryptocurrency addresses, credit card numbers, etc.) gov — that allows visitors to check whether their email address shows up in the data collected by the Raccoon Stealer service.

Malware 337
article thumbnail

LLMs and Phishing

Schneier on Security

They are forlorn strangers looking for romance, hot new cryptocurrencies that are soon to skyrocket in value, and seemingly-sound new financial websites offering amazing returns on deposits. Targeted attacks against individuals, whether for phishing or data collection or scams, were once only within the reach of nation-states.

Phishing 344
article thumbnail

New Version of Meduza Stealer Released in Dark Web

Security Affairs

One of the key significant improvements are support of more software clients (including browser-based cryptocurrency wallets), upgraded credit card (CC) grabber, and additional advanced mechanisms for password storage dump on various platforms to extract credentials and tokens.

article thumbnail

The state of cryptojacking in the first three quarters of 2022

SecureList

Cryptocurrency prices were dropping from the end of 2021 and throughout the first half of 2022. Apart from cryptocurrency theft they extort digital money or illicitly mine it using victim’s devices instead of their own. Cryptocurrency mining is a painstaking and costly process, and not as rewarding as when the prices were high.

article thumbnail

IT threat evolution Q3 2024

SecureList

CloudSorcerer is a sophisticated cyber-espionage tool used for stealth monitoring, data collection and exfiltration via Microsoft, Yandex and Dropbox cloud infrastructures. The data collected about the targets’ companies and contact information could be used to spy on people of interest and lay the groundwork for future attacks.