• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
exelastealer: a new low cost cybercrime weapon emerges

ExelaStealer: A New Low-Cost Cybercrime Weapon Emerges

You are here: Home / General Cyber Security News / ExelaStealer: A New Low-Cost Cybercrime Weapon Emerges
October 20, 2023

A new info stealer named ExelaStealer has become the hottest entrant to an presently crowded landscape loaded with different off-the-shelf malware developed to capture sensitive facts from compromised Windows techniques.

“ExelaStealer is a mostly open up-resource infostealer with paid out customizations available from the danger actor,” Fortinet FortiGuard Labs researcher James Slaughter mentioned in a specialized report.

Written in Python and incorporating support for JavaScript, it will come equipped with abilities to siphon passwords, Discord tokens, credit playing cards, cookies and session details, keystrokes, screenshots, and clipboard material.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


ExelaStealer is presented for sale by means of cybercrime community forums as nicely as a focused Telegram channel established up by its operators who go by the on line alias quicaxd. The compensated-for model costs $20 a thirty day period, $45 for 3 months, or $120 for a life time license.

Cybersecurity

The small price tag of the commodity malware makes it a perfect hacking resource for rookies, effectively reducing the barrier to entry for pulling off destructive attacks.

The stealer binary, in its current sort, can only be compiled and packaged on a Windows-based technique making use of a builder Python script, which throws needed supply code obfuscation to the combine in an endeavor to resist assessment.

There is evidence to propose that ExelaStealer is becoming distributed by using an executable that masquerades as a PDF doc, indicating that the first intrusion vector could be nearly anything ranging from phishing to watering holes.

ExelaStealer

Launching the binary displays a entice doc – a Turkish car registration certificate for a Dacia Duster – though stealthily activating the stealer in the qualifications.

“Data has come to be a important forex, and due to the fact of this, tries to assemble it will likely by no means stop,” Slaughter said.

“Infostealer malware exfiltrates knowledge belonging to companies and folks that can be made use of for blackmail, espionage, or ransom. Even with the selection of infostealers in the wild, ExelaStealer demonstrates there is continue to room for new gamers to arise and obtain traction.”

Cybersecurity

The disclosure will come as Kaspersky disclosed aspects of a campaign that targets government, law enforcement, and non-income organizations to fall many scripts and executables at as soon as to conduct cryptocurrency mining, steal details using keyloggers, and get backdoor obtain to systems.

“The B2B sector stays beautiful to cybercriminals, who request to exploit its assets for income-earning purposes,” the Russian cybersecurity organization reported, noting that most of the attacks had been aimed at corporations in Russia, Saudi Arabia, Vietnam, Brazil, Romania, the U.S., India, Morocco, and Greece.

Previously this week, U.S. cybersecurity and intelligence companies launched a joint advisory outlining the phishing procedures destructive actors normally use to obtain login credentials and deploy malware, highlighting their tries to impersonate a trusted source to comprehend their targets.

Found this write-up exciting? Follow us on Twitter  and LinkedIn to go through more unique articles we put up.


Some elements of this write-up are sourced from:
thehackernews.com

Previous Post: «u.s. doj cracks down on north korean it scammers defrauding U.S. DoJ Cracks Down on North Korean IT Scammers Defrauding Global Businesses
Next Post: Unleashing the Power of the Internet of Things and Cyber Security unleashing the power of the internet of things and cyber»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.