Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
4 résultats taggé Info-Stealer  ✕
Atomic macOS infostealer adds backdoor for persistent attacks https://www.bleepingcomputer.com/news/security/atomic-macos-infostealer-adds-backdoor-for-persistent-attacks/
08/07/2025 08:40:53
QRCode
archive.org
thumbnail

Malware analyst discovered a new version of the Atomic macOS info-stealer (also known as 'AMOS') that comes with a backdoor, to attackers persistent access to compromised systems.

Malware analyst discovered a new version of the Atomic macOS info-stealer (also known as 'AMOS') that comes with a backdoor, to attackers persistent access to compromised systems.

The new component allows executing arbitrary remote commands, it survives reboots, and permits maintaining control over infected hosts indefinitely.

MacPaw's cybersecurity division Moonlock analyzed the backdoor in Atomic malware after a tip from independent researcher g0njxa, a close observer of infostealer activity.
"AMOS malware campaigns have already reached over 120 countries, with the United States, France, Italy, the United Kingdom, and Canada among the most affected," the researchers say.

"The backdoored version of Atomic macOS Stealer now has the potential to gain full access to thousands of Mac devices worldwide."

bleepingcomputer EN 2025 AMOS Atomic Backdoor Info-Stealer Information-Stealer macOS
Lumma Stealer malware now uses trigonometry to evade detection https://www.bleepingcomputer.com/news/security/lumma-stealer-malware-now-uses-trigonometry-to-evade-detection/
20/11/2023 17:05:02
QRCode
archive.org
thumbnail

The Lumma information-stealing malware is now using an interesting tactic to evade detection by security software - the measuring of mouse movements using trigonometry to determine if the malware is running on a real machine or an antivirus sandbox.

bleepingcomputer EN 2023 Anti-VM Info-Stealer Information-stealing-malware Lumma LummaC2 Malware Malware-as-a-Service Security detection
Hackers push malware via Google search ads for VLC, 7-Zip, CCleaner https://www.bleepingcomputer.com/news/security/hackers-push-malware-via-google-search-ads-for-vlc-7-zip-ccleaner/
20/01/2023 12:00:16
QRCode
archive.org
thumbnail

Hackers are setting up fake websites for popular free and open-source software to promote malicious downloads through advertisements in Google search results.

bleepingcomputer EN 2023 googleads Advertisement Google Info-Stealer RedLine Search Vidar
Eternity, poche centinaia di dollari per un ransomware o un malware per furto dati https://www.italian.tech/blog/sicuri-nella-rete/2022/05/16/news/eternity_poche_centinaia_di_dollari_per_un_ransomware_o_un_malware_per_furto_dati-349771131/
17/05/2022 09:52:28
QRCode
archive.org
thumbnail

Numerosi rapporti ci suggeriscono che gli attacchi basati su codici malevoli rappresentano la maggioranza delle offensive cui osserviamo, tra esse la fanno da padrona i ransomware e gli info-stealer, questi ultimi sono malware concepiti per rubare un gran numero di informazioni dai sistemi infetti. Premesso ciò, chiediamoci quale sia la disponibilità sul mercato criminale di questi strumenti, quali siano i costi ed il modello di vendita.

italiantech IT 2022 Paganini Malware-as-a-Service info-stealer vendita prezzi
4507 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio