Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 1 / 2
38 résultats taggé Infostealer  ✕
No, the 16 billion credentials leak is not a new data breach https://www.bleepingcomputer.com/news/security/no-the-16-billion-credentials-leak-is-not-a-new-data-breach/
23/06/2025 09:19:35
QRCode
archive.org
thumbnail

News broke today about "one of the largest data breaches in history," sparking wide media coverage filled with warnings and fear-mongering. However, it appears to just be a compilation of previously leaked credentials stolen by infostealers, exposed in data breaches, and via credential stuffing attacks.

To be clear, this is not a new data breach, or a breach at all, and the websites involved were not recently compromised to steal these credentials.

Instead, these stolen credentials were likely circulating for some time, if not for years. It was then collected by a cybersecurity firm, researchers, or threat actors and repackaged into a database that was exposed on the Internet.

Cybernews, which discovered the briefly exposed datasets of compiled credentials, stated it was stored in a format commonly associated with infostealer malware, though they did not share samples

An infostealer is malware that attempts to steal credentials, cryptocurrency wallets, and other data from an infected device. Over the years, infostealers have become a massive problem, leading to breaches worldwide.

...

The infostealer problem has gotten so bad and pervasive that compromised credentials have become one of the most common ways for threat actors to breach networks.

bleepingcomputer EN 2025 Credential-Stuffing Data-Breach FUD Infostealer Leaked-Credentials
Éducation nationale : Stormous semble avoir constitué une « combolist » | https://www.lemagit.fr/actualites/366625817/Education-nationale-Stormous-semble-avoir-constitue-une-combolist
12/06/2025 12:39:24
QRCode
archive.org
thumbnail

Coup de tonnerre, en ce mardi 10 juin 2025. Le groupe malveillant Stormous revendique une cyberattaque contre les systèmes de l’Éducation nationale.

Il assure être en possession de données relatives à plus de 40 000 personnes et fournit, pour étayer ses allégations, un échantillon d’un peu moins de 1 400 lignes, soit autant de combinaison login/mot de passe, ou adresse mail/mot de passe. Et tout cela pour une poignée de services en ligne liés à l’Éducation nationale.

Mais cet échantillon suggère surtout que les allégations de Stormous sont fausses.

Nous l’avons confronté aux données de la plateforme Cavalier d’HudsonRock.

La conclusion s’impose rapidement : Stormous a commencé la divulgation d’une combolist vraisemblablement constituée en tout ou partie depuis d’innombrables logs de cleptogiciels (ou infostealers) partagés quotidiennement, gratuitement, et à tous les vents sur de multiples chaînes Telegram plus ou moins spécialisées. De quoi rappeler l’impressionnante liste ALIEN TXTBASE de la fin février.

LeMagIT FR 2025 Stormous combolist cleptogiciels infostealer alien-textbase
20,000 malicious IPs and domains taken down in INTERPOL infostealer crackdown https://www.interpol.int/fr/Actualites-et-evenements/Actualites/2025/20-000-malicious-IPs-and-domains-taken-down-in-INTERPOL-infostealer-crackdown
11/06/2025 16:33:08
QRCode
archive.org
thumbnail

41 servers seized and 32 suspects arrested during Operation Secure.

More than 20,000 malicious IP addresses or domains linked to information stealers have been taken down in an INTERPOL-coordinated operation against cybercriminal infrastructure.

During Operation Secure (January – April 2025) law enforcement agencies from 26 countries worked to locate servers, map physical networks and execute targeted takedowns.

Ahead of the operation, INTERPOL cooperated with private-sector partners Group-IB, Kaspersky and Trend Micro to produce Cyber Activity Reports, sharing critical intelligence with cyber teams across Asia. These coordinated efforts resulted in the takedown of 79 per cent of identified suspicious IP addresses.

Participating countries reported the seizure of 41 servers and over 100 GB of data, as well as the arrest of 32 suspects linked to illegal cyber activities.

Infostealer malware is a primary tool for gaining unauthorized access to organizational networks. This type of malicious software extracts sensitive data from infected devices, often referred to as bots. The stolen information typically includes browser credentials, passwords, cookies, credit card details and cryptocurrency wallet data.

Additionally, logs harvested by infostealers are increasingly traded on the cybercriminal underground and are frequently used as a gateway for further attacks. These logs often enable initial access for ransomware deployments, data breaches, and cyber-enabled fraud schemes such as Business Email Compromise (BEC).

Following the operation, authorities notified over 216,000 victims and potential victims so they could take immediate action - such as changing passwords, freezing accounts, or removing unauthorized access.
Vietnamese police arrested 18 suspects, seizing devices from their homes and workplaces. The group's leader was found with over VND 300 million (USD 11,500) in cash, SIM cards and business registration documents, pointing to a scheme to open and sell corporate accounts.

As part of their respective enforcement efforts under Operation Secure, house raids were carried out by authorities in Sri Lanka and Nauru. These actions led to the arrest of 14 individuals - 12 in Sri Lanka and two in Nauru - as well as the identification of 40 victims.

The Hong Kong Police analysed over 1,700 pieces of intelligence provided by INTERPOL and identified 117 command-and-control servers hosted across 89 internet service providers. These servers were used by cybercriminals as central hubs to launch and manage malicious campaigns, including phishing, online fraud and social media scams.

Neal Jetton, INTERPOL’s Director of Cybercrime, said:

“INTERPOL continues to support practical, collaborative action against global cyber threats. Operation Secure has once again shown the power of intelligence sharing in disrupting malicious infrastructure and preventing large-scale harm to both individuals and businesses.”

Notes to editors

Operation Secure is a regional initiative organized under the Asia and South Pacific Joint Operations Against Cybercrime (ASPJOC) Project.

Participating countries: Brunei, Cambodia, Fiji, Hong Kong (China), India, Indonesia, Japan, Kazakhstan, Kiribati, Korea (Rep of), Laos, Macau (China), Malaysia, Maldives, Nauru, Nepal, Papua New Guinea, Philippines, Samoa, Singapore, Solomon Islands, Sri Lanka, Thailand, Timor-Leste, Tonga, Vanuatu, Vietnam.

interpol EN 2025 operation-secure infostealer crackdown Asia
Lumma Infostealer – Down but Not Out? https://blog.checkpoint.com/security/lumma-infostealer-down-but-not-out/
02/06/2025 09:55:27
QRCode
archive.org
thumbnail

Key Findings:

  • The takedown achieved a significant disruption to Lumma infostealers’ infrastructure, but likely didn’t permanently affect most of its Russia-hosted infrastructure.
    • Lumma’s developers are undertaking significant efforts to reinstate the activity and to conduct business as usual.
    • There seems to be a significant reputational damage to the Lumma infostealer, and the key factor for the infostealer to resume regular activity will be the reputational factors (rather than the technological).

On May 21, 2025, Europol, FBI, and Microsoft, in collaboration with other public and private sector partners, announced an operation to dismantle the activity of the Lumma infostealer. The malware, considered to be one of the most prolific infostealers, is distributed through a malware-as-a-service model. In addition to its use by common cyber criminals for stealing credentials, Lumma was observed to be part of the arsenal of several prominent threat actor groups, including Scattered Spider, Angry Likho, and CoralRaider.
The Takedown on the Dark Web

According to the reports, the takedown operation began on May 15. On that day, Lumma customers flooded dark web forums that advertise the stealer, complaining they were unable to access the malware’s command and control (C2) servers and management dashboards.

checkpoint.com EN 2025 Lumma Infostealer
Europol and Microsoft disrupt world’s largest infostealer Lumma https://www.europol.europa.eu/media-press/newsroom/news/europol-and-microsoft-disrupt-world%E2%80%99s-largest-infostealer-lumma
22/05/2025 13:18:10
QRCode
archive.org
thumbnail

This joint operation targeted the sophisticated ecosystem that allowed Europol’s European Cybercrime Centre has worked with Microsoft to disrupt Lumma Stealer (“Lumma”), the world’s most significant infostealer threat.

This joint operation targeted the sophisticated ecosystem that allowed criminals to exploit stolen information on a massive scale. Europol coordinated with law enforcement in Europe to ensure action was taken, leveraging intelligence provided by Microsoft.

Between 16 March and 16 May 2025, Microsoft identified over 394 000 Windows computers globally infected by the Lumma malware. In a coordinated follow-up operation this week, Microsoft’s Digital Crimes Unit (DCU), Europol, and international partners have disrupted Lumma’s technical infrastructure, cutting off communications between the malicious tool and victims. In addition, over 1 300 domains seized by or transferred to Microsoft, including 300 domains actioned by law enforcement with the support of Europol, will be redirected to Microsoft sinkholes.

The Head of Europol’s European Cybercrime Centre, Edvardas Šileris, said: “This operation is a clear example of how public-private partnerships are transforming the fight against cybercrime. By combining Europol’s coordination capabilities with Microsoft’s technical insights, a vast criminal infrastructure has been disrupted. Cybercriminals thrive on fragmentation – but together, we are stronger.”

europol EEN 2025 LummaStealer operation disrupt infostealer
DOGE software engineer’s computer infected by info-stealing malware - Ars Technica https://arstechnica.com/security/2025/05/doge-software-engineers-computer-infected-by-info-stealing-malware/
09/05/2025 10:28:49
QRCode
archive.org
thumbnail

The presence of credentials in leaked “stealer logs” indicates his device was infected.

Login credentials belonging to an employee at both the Cybersecurity and Infrastructure Security Agency and the Department of Government Efficiency have appeared in multiple public leaks from info-stealer malware, a strong indication that devices belonging to him have been hacked in recent years.

Kyle Schutt is a 30-something-year-old software engineer who, according to Dropsite News, gained access in February to a “core financial management system” belonging to the Federal Emergency Management Agency. As an employee of DOGE, Schutt accessed FEMA’s proprietary software for managing both disaster and non-disaster funding grants. Under his role at CISA, he likely is privy to sensitive information regarding the security of civilian federal government networks and critical infrastructure throughout the US.

A steady stream of published credentials
According to journalist Micah Lee, user names and passwords for logging in to various accounts belonging to Schutt have been published at least four times since 2023 in logs from stealer malware. Stealer malware typically infects devices through trojanized apps, phishing, or software exploits. Besides pilfering login credentials, stealers can also log all keystrokes and capture or record screen output. The data is then sent to the attacker and, occasionally after that, can make its way into public credential dumps.

“I have no way of knowing exactly when Schutt's computer was hacked, or how many times,” Lee wrote. “I don't know nearly enough about the origins of these stealer log datasets. He might have gotten hacked years ago and the stealer log datasets were just published recently. But he also might have gotten hacked within the last few months.”

arstechnica EN 2025 DOGE infostealer US hacked engineer
Cookie-Bite: How Your Digital Crumbs Let Threat Actors Bypass MFA and Maintain Access to Cloud Environments https://www.varonis.com/blog/cookie-bite
23/04/2025 09:39:55
QRCode
archive.org
thumbnail

Silent and undetectable initial access is the cornerstone of a cyberattack. MFA is there to stop unauthorized access, but attackers are constantly evolving.

varonis EN 2025 Technique Cookie-Bite Bypass MFA infostealer
Unmasking FleshStealer: A New Infostealer Threat in 2025 https://flashpoint.io/blog/fleshstealer-infostealer-threat-2025/
29/01/2025 08:51:53
QRCode
archive.org
thumbnail

We dive into FleshStealer, a new strain of information-stealing malware—explaining what it is and its potential impact on organizations.

flashpoint EN 2025 Infostealer analysis Infostealer
Hundreds of fake Reddit sites push Lumma Stealer malware https://www.bleepingcomputer.com/news/security/hundreds-of-fake-reddit-sites-push-lumma-stealer-malware/
24/01/2025 08:37:31
QRCode
archive.org
thumbnail

Hackers are distributing close to 1,000 web pages mimicking Reddit and the WeTransfer file sharing service that lead to downloading the Lumma Stealer malware.

bleepingcomputer EN 2025 Impersonation Information-Stealer Infostealer Lumma Malware Reddit WeTransfer
Life on a crooked RedLine: Analyzing the infamous infostealer’s backend https://www.welivesecurity.com/en/eset-research/life-crooked-redline-analyzing-infamous-infostealers-backend/
11/11/2024 22:38:18
QRCode
archive.org

Following the takedown of RedLine Stealer by international authorities, ESET researchers are publicly releasing their research into the infostealer’s backend modules.

welivesecurity EN 2024 analysis RedLine infostealer backend
From Perfctl to InfoStealer https://isc.sans.edu/diary/From%20Perfctl%20to%20InfoStealer/31334
09/10/2024 16:09:09
QRCode
archive.org
thumbnail

From Perfctl to InfoStealer, Author: Xavier Mertens

sans EN 2024 Perfctl infostealer analysis linux
Beyond the wail: deconstructing the BANSHEE infostealer https://www.elastic.co/security-labs/beyond-the-wail
16/08/2024 17:35:09
QRCode
archive.org
thumbnail

The BANSHEE malware is a macOS-based infostealer that targets system information, browser data, and cryptocurrency wallets.

elastic.co EN 2024 macOS BANSHEE infostealer
LummaC2 Malware Abusing the Game Platform 'Steam' - ASEC BLOG https://asec.ahnlab.com/en/68309/
29/07/2024 09:29:05
QRCode
archive.org
thumbnail

LummaC2 is an Infostealer that is being actively distributed, disguised as illegal programs (e.g. cracks, keygens, and game hacking programs) available from distribution websites, YouTube, and LinkedIn using the SEO poisoning technique. Recently, it has also been distributed via search engine ads, posing as web pages of Notion, Slack, Capcut, etc.

Reference: Distribution of MSIX Malware Disguised as Notion Installer

ahnlab EN 2024 LummaC2 Infostealer steam craks keygens SEO-poisoning MSIX Notion Installer
Iraq-based cybercriminals deploy malicious Python packages to steal data https://therecord.media/iraq-cybercriminals-python-based-infostealer-pypi?_hsenc=p2ANqtz-8qzrAM5mnOGvItSx2pDNTwWqQxyFNDlKq54MT8n5ivT3COdXjT71xW2nneojY19e5azWbfFrE35XlsGKxrTv7ncaVRzg&_hsmi=316193425
18/07/2024 09:54:38
QRCode
archive.org
thumbnail

An information-stealing script embedded in a Python package on the popular repository PyPI appears to be connected to a cybercriminal operation based in Iraq, according to researchers at Checkmarx.

therecord.media EN 2024 PyPI Python Infostealer Supply-chain-attack
Caught in the Net: Using Infostealer Logs to Unmask CSAM Consumers https://www.recordedfuture.com/caught-in-the-net-using-infostealer-logs-to-unmask-csam-consumers
04/07/2024 07:24:58
QRCode
archive.org

Discover how Recorded Future uses infostealer logs to identify CSAM consumers and trends. Learn key findings and mitigation strategies.

recordedfuture EN 2024 Unmask CSAM Infostealer Logs
Telegram Combolists and 361M Email Addresses https://www.troyhunt.com/telegram-combolists-and-361m-email-addresses/
03/06/2024 21:48:52
QRCode
archive.org
thumbnail

Last week, a security researcher sent me 122GB of data scraped out of thousands of Telegram channels. It contained 1.7k files with 2B lines and 361M unique email addresses of which 151M had never been seen in HIBP before. Alongside those addresses were passwords and, in many cases, the website the data pertains to. I've loaded it into Have I Been Pwned (HIBP) today because there's a huge amount of previously unseen email addresses and based on all the checks I've done, it's legitimate data. That's the high-level overview, now here are the details:

troyhunt EN 2024 Telegram Combolists 361M Email Addresses 122GB HIBP infostealer
An Infostealer's Brewin': Cuckoo & AtomicStealer Get Creative https://alden.io/posts/infostealers-a-brewin/
15/05/2024 20:54:08
QRCode
archive.org
thumbnail

Recent infostealer malware campaign utilizing fake Homebrew websites to deliver Cuckoo and AtomicStealer.

alden EN 2024 macOS Malware RE CTI AMOS Infostealer Homebrew
Malware: Cuckoo Behaves Like Cross Between Infostealer and Spyware https://blog.kandji.io/malware-cuckoo-infostealer-spyware
01/05/2024 00:29:09
QRCode
archive.org
thumbnail

Kandji's threat research team has discovered a piece of malware that combines aspects of an infostealer and spyware. Here's how it works.

kandji EN 2024 spyware infostealer cuckoo analysis
Infostealers continue to pose threat to macOS users https://www.jamf.com/blog/infostealers-pose-threat-to-macos/?ref=news.risky.biz
01/04/2024 10:41:09
QRCode
archive.org
thumbnail

Jamf Threat Labs dissects ongoing infostealer attacks targeting macOS users. Each with different means of compromising victim’s Macs but with similar aims: to steal sensitive user data.

jamf EN 2024 Infostealer macOS AtomicStealer stealer sponsored-ads Meethub
Vidar Infostealer Steals Booking.com Credentials in Fraud Scam https://www.secureworks.com/blog/vidar-infostealer-steals-booking-com-credentials-in-fraud-scam
01/12/2023 15:21:45
QRCode
archive.org
thumbnail

Learn how a threat actor used spearphishing emails and social engineering tactics to obtain a hotel’s credentials and solicit customers’ payment information.

secureworks EN 2023 booking.com Vidar Infostealer Steals
page 1 / 2
4508 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio