Phần mềm độc hại Prynt Stealer chỉ được bán trên Dark Web $100 mỗi tháng

Cybersecurity specialists from Cyble have discovered a new information-stealing malware called Prynt Stealer. The malware has a wide range of capabilities and comes with additional keylogger and clipper modules.

Prynt Stealer is advertised as a solution to compromise a wide variety of browsers, instant messengers and gaming applications, and it is also capable of carrying out direct financial attacks.

Prynt Stealer is a subscription service and the authors charge $100/month, $200/quarter, or $700/year, and offer a lifetime license for $900.

Nhân tiện, if you are interested in the darknet criminal life, you might like our article: Darknet sites of the REvil group are working again: người Nga đã thả tội phạm mạng ra ngoài tự nhiên? or you might be interested in this information: Kẻ đánh cắp RedLine malware is the main source of credentials in two major marketplaces.

Hơn thế nữa, buyers can use the constructor to create their own, compact and hard-to-detect version of the malware that can be used in targeted attacks.

Phần mềm độc hại Prynt Stealer

Cyble analysts write that Prynt Stealer was created with an emphasis on stealth and uses binary obfuscation and string encryption using Rijndael. Ngoài ra, all communications with the management servers are encrypted using AES256, and the AppData folder (and subfolders) needed to temporarily store stolen data is hidden.

Phần mềm độc hại Prynt Stealer

Once on the victim’s machine, Prynt Stealer scans all disks on the host and steals documents, database files, source code, and image files smaller than 5120 bytes (5 KB).

Sau đó, the malware switches to browsers based on Chrome, Firefox and MS Edge, stealing autofill data, credentials, bank card information, search history and cookies. At this stage, the malware uses ScanData() to search browser data for keywords related to banks, cryptocurrencies, and porn sites, and steals what it finds if information is found.

After Prynt Stealer attacks messengers, including Discord, PidginTelegram, and steals Discord tokens if they are in the system. Game application authorization files, game save files and other valuable data from Ubisoft Uplay, SteamMinecraft are also stolen.

In the end, the malware queries the registry to find the data of cryptocurrency wallets such as Zcash, Armory, Bytecoin, Jaxx, Ethereum, AtomicWallet, GuardaCoinomi, and also steals information from FileZilla, OpenVPN, NordVPN and ProtonVPN by copying the corresponding credentials to the one mentioned above. subfolder in AppData.

Before the actual theft, Prynt Stealer also performs general system profiling, including creating a list of running processes, taking a screenshot, and linking the collected information to the network credentials and Windows key that is used on the victim’s machine.Cyble experts say.

The data transfer itself is carried out using a Telegram bot, which uses an encrypted network connection to upload the dump to a remote server.

As mentioned above, in addition to these functions, the malware is equipped with keylogger modules (to intercept keystrokes) and a clipper (tracks and replaces cryptocurrency addresses in the clipboard).

Experts summarize that the new Prynt Stealer is a very dangerous malware that can steal user confidential data, lead to significant financial losses, account compromise and data leakage.

Helga Smith

Tôi luôn quan tâm đến khoa học máy tính, đặc biệt là bảo mật dữ liệu và chủ đề, được gọi là ngày nay "khoa học dữ liệu", kể từ khi tôi còn ở tuổi thiếu niên. Trước khi vào nhóm Diệt Virus với vai trò Tổng biên tập, Tôi đã làm việc với tư cách là chuyên gia an ninh mạng tại một số công ty, bao gồm một trong những nhà thầu của Amazon. Một trải nghiệm khác: Tôi đã nhận được đang giảng dạy tại các trường đại học Arden và Reading.

Gửi phản hồi

Website này sử dụng Akismet để hạn chế spam. Tìm hiểu bình luận của bạn được duyệt như thế nào.

Nút quay lại đầu trang