• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
dark web malware logs expose 3,300 users linked to child

Dark Web Malware Logs Expose 3,300 Users Linked to Child Abuse Sites

You are here: Home / General Cyber Security News / Dark Web Malware Logs Expose 3,300 Users Linked to Child Abuse Sites
July 8, 2024

An evaluation of information-stealing malware logs released on the dark web has led to the discovery of 1000’s of people of child sexual abuse material (CSAM), indicating how such data could be made use of to battle major crimes.

“About 3,300 one of a kind users have been identified with accounts on regarded CSAM sources,” Recorded Upcoming mentioned in a proof-of-concept (PoC) report released previous 7 days. “A noteworthy 4.2% experienced qualifications for a number of resources, suggesting a bigger chance of legal behavior.”

About the earlier few several years, off-the-shelf data-stealer variants have come to be a pervasive and ubiquitous menace targeting many functioning devices with an purpose to siphon sensitive details these types of as qualifications, cryptocurrency wallets, payment card data, and screenshots.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Cybersecurity

This is evidenced in the increase of new stealer malware strains these kinds of as Kematian Stealer, Neptune Stealer, 0bj3ctivity, Poseidon (formerly RodStealer), Satanstealer, and StrelaStealer.

Dispersed by using phishing, spam strategies, cracked software program, pretend update web sites, Search engine marketing poisoning, and malvertising, details harvested using this sort of applications typically uncover their way on to the dark web in the kind of stealer logs from where by they are bought by other cybercriminals to further their schemes.

Dark Web Malware

“Staff members on a regular basis help you save corporate qualifications on particular equipment or obtain own sources on organizational equipment, growing the risk of infection,” Flare mentioned in a report previous July.

“A advanced ecosystem exists in which malware-as-a-services (MaaS) distributors market data-stealer malware on illicit Telegram channels, risk actors distribute it by means of bogus cracked program or phishing emails, and they then sell contaminated machine logs on specialised dark web marketplaces.”

Recorded Future’s Insikt Team mentioned it was ready to establish 3,324 unique qualifications applied to obtain regarded CSAM domains in between February 2021 and February 2024, utilizing them to unmask 3 men and women who have been identified to maintain accounts at no fewer than 4 internet websites.

Cybersecurity

The point that stealer logs also comprise cryptocurrency wallet addresses implies it could be employed to identify if the addresses have been employed to procure CSAM and other dangerous substance.

In addition, international locations like Brazil, India, and the U.S. had the greatest counts of consumers with qualifications to recognized CSAM communities, although the enterprise mentioned that it could be thanks to an “overrepresentation due to dataset sourcing.”

“Details-stealer malware and stolen credentials are projected to stay a cornerstone of the cybercriminal economy thanks to the significant demand by menace actors trying to get initial obtain to targets,” it claimed, including it has shared its conclusions with regulation enforcement.

“Data-stealer logs can be utilised by investigators and legislation enforcement companions to track little one exploitation on the dark web and give perception into a element of the dark web that is specifically difficult to trace.”

Located this report interesting? Follow us on Twitter  and LinkedIn to browse extra distinctive material we post.


Some areas of this write-up are sourced from:
thehackernews.com

Previous Post: «new ransomware as a service 'eldorado' targets windows and linux systems New Ransomware-as-a-Service ‘Eldorado’ Targets Windows and Linux Systems
Next Post: New APT Group “CloudSorcerer” Targets Russian Government Entities new apt group "cloudsorcerer" targets russian government entities»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month
  • Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion
  • CTEM is the New SOC: Shifting from Monitoring Alerts to Measuring Risk
  • Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware
  • WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network
  • New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes
  • AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar
  • Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction
  • Non-Human Identities: How to Address the Expanding Security Risk
  • ConnectWise to Rotate ScreenConnect Code Signing Certificates Due to Security Risks

Copyright © TheCyberSecurity.News, All Rights Reserved.