Stealer
- APPLICATIONS
From Browser Stealer to Intelligence-Gathering Tool
î ‚Jun 28, 2025î „Ravie LakshmananMalware / Cyber Warfare The threat actor behind the GIFTEDCROOK malware has made significant updates to turn…
Read More » - APPLICATIONS
Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets
A new malware campaign is exploiting a weakness in Discord’s invitation system to deliver an information stealer called Skuld and…
Read More » - APPLICATIONS
Rust-based Myth Stealer Malware Spread via Fake Gaming Sites Targets Chrome, Firefox Users
Cybersecurity researchers have shed light on a previously undocumented Rust-based information stealer called Myth Stealer that’s being propagated via fraudulent…
Read More » - APPLICATIONS
New Atomic macOS Stealer Campaign Exploits ClickFix to Target Apple Users
Cybersecurity researchers are alerting to a new malware campaign that employs the ClickFix social engineering tactic to trick users into…
Read More » - APPLICATIONS
A 24-Hour Timeline of a Modern Stealer Campaign
î ‚May 28, 2025î „The Hacker NewsIdentity Theft / Enterprise Security Stealer malware no longer just steals passwords. In 2025, it steals…
Read More » - APPLICATIONS
FBI and Europol Disrupt Lumma Stealer Malware Network Linked to 10 Million Infections
A sprawling operation undertaken by global law enforcement agencies and a consortium of private sector firms has disrupted the online…
Read More » - APPLICATIONS
UAC-0226 Deploys GIFTEDCROOK Stealer via Malicious Excel Files Targeting Ukraine
The Computer Emergency Response Team of Ukraine (CERT-UA) has revealed a new set of cyber attacks targeting Ukrainian institutions with…
Read More » - APPLICATIONS
YouTube Game Cheats Spread Arcane Stealer Malware to Russian-Speaking Users
î ‚Mar 20, 2025î „Ravie LakshmananMalware / Threat Analysis YouTube videos promoting game cheats are being used to deliver a previously undocumented…
Read More » - APPLICATIONS
EncryptHub Deploys Ransomware and Stealer via Trojanized Apps, PPI Services, and Phishing
î ‚Mar 06, 2025î „Ravie LakshmananMalware / Ransomware The financially motivated threat actor known as EncryptHub has been observed orchestrating sophisticated phishing…
Read More » - APPLICATIONS
5,000 Phishing PDFs on 260 Domains Distribute Lumma Stealer via Fake CAPTCHAs
Cybersecurity researchers have uncovered a widespread phishing campaign that uses fake CAPTCHA images shared via PDF documents hosted on Webflow’s…
Read More »