RedLine Stealer spilliforrit er aðaluppspretta skilríkja á tveimur helstu markaðsstöðum
According to Insikt Group sérfræðingar, the vast majority of stolen credentials sold on two large underground darknet marketplaces are collected using the RedLine Stealer malware.
RedLine Stealer was first discovered in March 2020. The malware is capable of extracting credentials from browsers, FTP clients, emails, instant messengers, and VPNs. Auk þess, the malware can steal authentication cookies and card numbers stored in browsers, chat logs, local files and databases of cryptocurrency wallets.
Initially, this malware was sold on hack forums called REDGlade, but after the tool received positive reviews, pirated versions of RedLine Steale began to appear on the same forums.
As a result, by August of this year, this allowed malware to spread widely among cybercriminals, and they did not even have to pay to use the malware. At the same time, the researchers note that the paid version of RedLine Steale also found its customers.
The Insikt Group experts’ conclusions echo a similar KELA report dated February 2020. Then the researchers found that about 90% of the stolen credentials on the Genesis Market were obtained as a result of attacks by the AZORult info-stealer.
These findings suggest that underground marketplaces are highly fragmented and usually work with their own specific vendors. Likewise, legitimate marketplaces have their own preferences in choosing business partners.
Ég minni á að við skrifuðum það líka BluStealer malware steals cryptocurrency and spreads through phishing emails.