Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

Meta Earth Network 2.0: Pioneering Web3 Innovation with Rewards and Global Events

The more sustainability and transparency you get, the better your decisions will be

Successful In-house SOC 6 steps up to 24 hours a day, 365 days a year

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » New malware campaigns use cracked software to spread Lumma and ACR Stealer
Identity

New malware campaigns use cracked software to spread Lumma and ACR Stealer

userBy userFebruary 24, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

February 24, 2025Ravi LakshmananEndpoint security/vulnerability

Cybersecurity researchers are warning of new campaigns that will utilize cracked versions of the software as lures for distributing information steelers such as Lumma and ACR Stealer.

The Ahnlab Security Intelligence Center (ASEC) said it has been observing a surge in ACR Stealer distribution since January 2025.

A notable aspect of steeler malware is the use of a technique called Dead Drop Resolver to extract real command and control (C2) servers. This includes relying on legitimate services such as Steam, Telegram’s Telegraph, Google Forms, and Google Slides.

“Threat actors enter the actual C2 domain with Base64 encoding to a specific page,” ASEC said. “The malware will visit this page, parse the string, get the actual C2 domain address and perform malicious behavior.”

Cybersecurity

Previously distributed via hijacking loader malware, ACR Stealer can harvest a wide range of information from compromised systems, including files, web browser data, and cryptocurrency wallet extensions.

The development occurs as ASEC revealed another campaign that uses files with the extension “MSC” that Microsoft Management Console (MMC) can run to provide Rhadamanthys Stealer malware.

“There are two types of MSC malware: one leverages a vulnerability in APDS.DLL (CVE-2024-43572), and the other uses the console taskpad to execute the command command. “We’ll do that,” the Korean company said.

“MSC file is impersonated as an MS Word Document.” When the “Open” button is clicked, it downloads and runs a PowerShell script from an external source. The downloaded PowerShell script contains the exe file (Rhadamanthys). ”

CVE-2024-43572, also known as Grimresource, was first recorded in June 2024 as being exploited as zero-day by a malicious actor by the Elastic Security Lab. The patch was applied by Microsoft in October 2024.

Malware campaigns have been observed to use chat support platforms such as Zendesk, spoofing customers, tricking unsuspecting support agents to download a steeler called Zhong Stealer.

A recent report published by Hudson Rock shows that over 30,000,000 computers have been infected with information stolen “in the past few years,” leading to the theft of corporate credentials and session cookies, and then Cybercriminals on underground forums Session cookies that can be sold to other actors for profit.

Buyers can use the access provided by these credentials as weapons to set the post-explosion action into their own actions, leading to serious risks. These developments help to highlight the role Stealer Malware plays as an initial access vector that provides a foothold in a sensitive corporate environment.

“For just $10 per log (computer), cybercriminals can purchase stolen data from employees working in the classified defense and military sectors,” Hudson Locke said. “Infostealer Intelligence isn’t just about detecting who’s infected. It’s about understanding a compromised qualification and a complete network of third-party risks.”

Cybersecurity

Over the past year, threat actors have stepped up their efforts to spread a wide range of malware families, including steelers and remote access trojans (rats). Run the Nefarious Powershell command.

One such payload was dropped is I2Plat. This anonymizes the final C2 server using an I2P anonymization network.

“Malware is a sophisticated threat consisting of multiple layers, each with a sophisticated mechanism built into it,” says Sekoia. “The use of anonymous networks complicates tracking, prevents the identification of threat magnitudes, and spreads wildly.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleResearchers accus North Korea of ​​$1.4 billion of Bibit Crypto robbers
Next Article PayPal brings many brands under a single umbrella, Venmo remains standalone
user
  • Website

Related Posts

Successful In-house SOC 6 steps up to 24 hours a day, 365 days a year

June 20, 2025

A massive 7.3 TBPS DDOS attack targets hosting providers and delivers 37.4 TB in 45 seconds

June 20, 2025

Troilerization Github repository found in a campaign targeting 67 gamers and developers

June 20, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Meta Earth Network 2.0: Pioneering Web3 Innovation with Rewards and Global Events

The more sustainability and transparency you get, the better your decisions will be

Successful In-house SOC 6 steps up to 24 hours a day, 365 days a year

A massive 7.3 TBPS DDOS attack targets hosting providers and delivers 37.4 TB in 45 seconds

Trending Posts

Sana Yousaf, who was the Pakistani Tiktok star shot by gunmen? |Crime News

June 4, 2025

Trump says it’s difficult to make a deal with China’s xi’ amid trade disputes | Donald Trump News

June 4, 2025

Iraq’s Jewish Community Saves Forgotten Shrine Religious News

June 4, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Meta Earth Network 2.0: Pioneering Web3 Innovation with Rewards and Global Events

Top 10 Startups and High-Tech Funding News – June 19, 2025

Sifflet raises $18 million to power AI using reliable data as a demand for observability

Is WhatsApp becoming a weapon of war?

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.