On Monday researchers from SEKOIA.IO reported the rise of a new information stealer. Called “Stealc,” the malware was first advertised as a competitor to Vidar and Raccoon stealers in January of this year. Since then, over 40 samples of Stealc have been discovered in the wild, as well as 35 Command and Control (C2) servers. The malware is designed to steal data from browsers, browser extensions, desktop crypto wallets, email and messaging clients, and boasts customizability. In addition to capability of tailoring data collection to a specific target, Stealc also has a file grabber that can be customized to target specific files, as well as a loader, enabling the attacker to load malware onto the victim. To facilitate the stealing activities, it has a fully featured administration panel.
12 Essentials for a Successful SOC Partnership
As cyber threats continue to impact businesses of all sizes, the need for round-the-clock security