• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
dark web malware logs expose 3,300 users linked to child

Dark Web Malware Logs Expose 3,300 Users Linked to Child Abuse Sites

You are here: Home / General Cyber Security News / Dark Web Malware Logs Expose 3,300 Users Linked to Child Abuse Sites
July 8, 2024

An evaluation of information-stealing malware logs released on the dark web has led to the discovery of 1000’s of people of child sexual abuse material (CSAM), indicating how such data could be made use of to battle major crimes.

“About 3,300 one of a kind users have been identified with accounts on regarded CSAM sources,” Recorded Upcoming mentioned in a proof-of-concept (PoC) report released previous 7 days. “A noteworthy 4.2% experienced qualifications for a number of resources, suggesting a bigger chance of legal behavior.”

About the earlier few several years, off-the-shelf data-stealer variants have come to be a pervasive and ubiquitous menace targeting many functioning devices with an purpose to siphon sensitive details these types of as qualifications, cryptocurrency wallets, payment card data, and screenshots.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Cybersecurity

This is evidenced in the increase of new stealer malware strains these kinds of as Kematian Stealer, Neptune Stealer, 0bj3ctivity, Poseidon (formerly RodStealer), Satanstealer, and StrelaStealer.

Dispersed by using phishing, spam strategies, cracked software program, pretend update web sites, Search engine marketing poisoning, and malvertising, details harvested using this sort of applications typically uncover their way on to the dark web in the kind of stealer logs from where by they are bought by other cybercriminals to further their schemes.

Dark Web Malware

“Staff members on a regular basis help you save corporate qualifications on particular equipment or obtain own sources on organizational equipment, growing the risk of infection,” Flare mentioned in a report previous July.

“A advanced ecosystem exists in which malware-as-a-services (MaaS) distributors market data-stealer malware on illicit Telegram channels, risk actors distribute it by means of bogus cracked program or phishing emails, and they then sell contaminated machine logs on specialised dark web marketplaces.”

Recorded Future’s Insikt Team mentioned it was ready to establish 3,324 unique qualifications applied to obtain regarded CSAM domains in between February 2021 and February 2024, utilizing them to unmask 3 men and women who have been identified to maintain accounts at no fewer than 4 internet websites.

Cybersecurity

The point that stealer logs also comprise cryptocurrency wallet addresses implies it could be employed to identify if the addresses have been employed to procure CSAM and other dangerous substance.

In addition, international locations like Brazil, India, and the U.S. had the greatest counts of consumers with qualifications to recognized CSAM communities, although the enterprise mentioned that it could be thanks to an “overrepresentation due to dataset sourcing.”

“Details-stealer malware and stolen credentials are projected to stay a cornerstone of the cybercriminal economy thanks to the significant demand by menace actors trying to get initial obtain to targets,” it claimed, including it has shared its conclusions with regulation enforcement.

“Data-stealer logs can be utilised by investigators and legislation enforcement companions to track little one exploitation on the dark web and give perception into a element of the dark web that is specifically difficult to trace.”

Located this report interesting? Follow us on Twitter  and LinkedIn to browse extra distinctive material we post.


Some areas of this write-up are sourced from:
thehackernews.com

Previous Post: «new ransomware as a service 'eldorado' targets windows and linux systems New Ransomware-as-a-Service ‘Eldorado’ Targets Windows and Linux Systems
Next Post: New APT Group “CloudSorcerer” Targets Russian Government Entities new apt group "cloudsorcerer" targets russian government entities»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • OpenAI Unveils Aardvark: GPT-5 Agent That Finds and Fixes Code Flaws Automatically
  • Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack
  • China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats
  • China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems
  • The MSP Cybersecurity Readiness Guide: Turning Security into Growth
  • CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers
  • Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery
  • CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks
  • A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do
  • Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month

Copyright © TheCyberSecurity.News, All Rights Reserved.