Amnesia Stealer
Blog In the current digital environment, cybercriminals are always updating their strategies, using fresh technologies to get around security measures and access systems. The Amnesia Stealer, a sophisticated and dangerous piece of malware, has recently been added to their arsenal, garnering global attention from security experts. What does Amnesia Stealer entail? Discovered in […]
X-ZIGZAG RAT
Blog X-ZIGZAG RAT: Unraveling the Tactics of a Sophisticated RAM-Based Threat Cyber threats continue to evolve, and one of the most recent and sophisticated examples is the X-ZIGZAG RAT. Detected by ThreatMon in 2024, this malware targets Windows systems using advanced techniques to evade detection, such as operating entirely in RAM and employing complex sandbox […]
Ailurophile Stealer: A Threatening Information Stealer Malware
Blog This blog summarizes the Ailurophile Stealer Technical & Malware Analysis Report. It explains in detail the technical analysis of Ailurophile Stealer and how one can secure oneself against security vulnerabilities. What is Ailurophile Stealer? Ailurophile Stealer is an advanced information-stealing malware that first appeared on ThreatMon on August 15, 2024. The malware is hosted on publicly […]
Kematian Stealer Technical Analysis
Blog In the ever-evolving world of cybersecurity, new threats emerge constantly, challenging our defenses and requiring continuous vigilance. One such threat that has recently come to light is the “Kematian Stealer,” an advanced information-stealing malware. ThreatMon’s Kematian Stealer Technical Analysis Report aims to provide an in-depth analysis of this potent malware, its features, and the […]
Navigating the Threat Landscape: Stealer Logs and Their Impact on Security
Blog The new era of the digital domain has brought the world closer together in unprecedented ways, offering a level of ease and expedience that has never before been possible. However, it has also created its own unique set of security-related problems, including one of the most serious and evolving kinds of stealer logs. What […]
PyPI Package ‘secretslib’ Drops Fileless Cryptominer to Linux Systems
Blog PyPI Package ‘secretslib’ Drops Fileless Cryptominer to Linux Systems A PyPI package named “secretslib” has been identified by Sonatype, which describes itself as “secret mapping and verification made easy”. The package secretly runs cryptominers in the memory of the Linux machine, a technique largely used by fileless malware and cryptominers. Secretslib was downloaded 93 […]
Kaspersky Published a Report on Malicious Browser Extensions
Blog Kaspersky analyzed threat statistics by processing data voluntarily shared by its users for the period from January 2020 to June 2022. According to this data, during the first half of this year, 1,311,557 users tried to download malicious or unwanted extensions at least once. From January 2020 to June 2022, nearly 70 percent of users […]
Akira: Undetectable Stealer Unleashed
Blog Introduction A new Stealer named Akira has been put up for sale on Telegram. It has the following features: Password grabber Cookies grabber Bookmarks grabber Crypto wallets and 2fa extensions dump (Grabs 💸 Zcash, 🚀 Armory, 📀 Bytecoin, 💵 Jaxx, 💎 Exodus desktop/extension, 📉 Ethereum, 🔨 Electrum, 🕹 AtomicWallet, 💹 Guarda, ⚡️ Coinbase, 🦊 […]
ChatGPT and Malware Analysis – ThreatMon
Blog What is ChatGPT? ChatGPT is an AI driven chatbot launched by OpenAI in November 2022. ChatGPT is a variant of the GPT (Generative Pre-training Transformer) language model that has been fine-tuned for the task of conversational response generation. Like other GPT models, ChatGPT uses a transformer architecture to process and generate text. However, it […]
TA558 APT Group Uses Malicious Microsoft Compiled HTML Help Files
Blog Who is TA558? TA558, a financially-motivated cybercrime group, has been targeting the hospitality, travel, and related industries located in Latin America, North America, and Western Europe since 2018. The group sends malicious emails in Portuguese, Spanish, and sometimes English, using lures related to reservations and business themes such as hotel bookings. The emails may […]