![]() ![]() ![]() They checked out many different hosting samples, including crackheapnet, startcrackcom, keygenninjacom, and piratewarescom. Proofpoint researchers reported that CopperStealer was identified after they found suspicious websites advertised as KeyGen or Crack sites. Suspicious KeyGen and Crack Sites Discovered The browsers searched by CopperStealer for saved passwords include Chrome, Edge, Yandex, Opera, and Firefox. However, the researchers also identified new versions of CopperStealer that targeted PayPal, Bing, Twitter, and Tumblr. While investigating, Proofpoint researchers observed a sample targeting advertisers and business accounts on Facebook and Instagram. The earliest samples of this malware were discovered in July 2019. This malware is currently in active development. It is basically a password and cooking stealer containing a download feature that lets its operators deliver additional payloads to infected devices. CopperStealer Credential Stealing Capabilities “Our investigation uncovered an actively developed password and cookie stealer with a downloader function, capable of delivering additional malware after performing stealer activity,” researchers wrote. The IT security researchers at Proofpoint researchers have discovered a new malware strain that has widespread credential-stealing capabilities.Īptly dubbed CopperStealer this new strain can steal user credentials from biggies like Facebook, Amazon, Google, and Apple apart from other mainstream online platforms. The credential-stealing malware was found in keygen and Cracks-related websites to circumvent licensing restrictions to legit software. ![]()
0 Comments
|
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
March 2023
Categories |