• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
hackers using cracked software on github to spread risepro info

Hackers Using Cracked Software on GitHub to Spread RisePro Info Stealer

You are here: Home / General Cyber Security News / Hackers Using Cracked Software on GitHub to Spread RisePro Info Stealer
March 16, 2024

Cybersecurity researchers have located a selection of GitHub repositories featuring cracked software that are made use of to deliver an information stealer known as RisePro.

The marketing campaign, codenamed gitgub, consists of 17 repositories associated with 11 diverse accounts, in accordance to G Info. The repositories in issue have given that been taken down by the Microsoft-owned subsidiary.

“The repositories look very similar, that includes a README.md file with the guarantee of totally free cracked program,” the German cybersecurity firm stated.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“Environmentally friendly and crimson circles are normally used on Github to display the status of automated builds. Gitgub threat actors additional four eco-friendly Unicode circles to their README.md that faux to display a standing together with a recent date and deliver a perception of legitimacy and recency.”

Cybersecurity

The list of repositories is as follows, with just about every of them pointing to a download connection (“digitalxnetwork[.]com”) that contains a RAR archive file –

  • andreastanaj/AVAST
  • andreastanaj/Audio-Booster
  • aymenkort1990/fabfilter
  • BenWebsite/-IObit-Intelligent-Defrag-Crack
  • Faharnaqvi/VueScan-Crack
  • javisolis123/Voicemod
  • lolusuary/AOMEI-Backupper
  • lolusuary/Daemon-Tools
  • lolusuary/EaseUS-Partition-Grasp
  • lolusuary/SOOTHE-2
  • mostofakamaljoy/ccleaner
  • rik0v/ManyCam
  • Roccinhu/Tenorshare-Reiboot
  • Roccinhu/Tenorshare-iCareFone
  • Accurate-Oblivion/AOMEI-Partition-Assistant
  • vaibhavshiledar/droidkit
  • vaibhavshiledar/TOON-Growth-HARMONY

The RAR archive, which calls for the victims to offer a password stated in the repository’s README.md file, incorporates an installer file, which unpacks the up coming-stage payload, an executable file that is inflated to 699 MB in an work to crash examination instruments like IDA Pro.

The real contents of the file – amounting to a mere 3.43 MB – act as a loader to inject RisePro (model 1.6) into both AppLaunch.exe or RegAsm.exe.

RisePro burst into the highlight in late 2022 when it was dispersed utilizing a spend-for every-put in (PPI) malware downloader service known as PrivateLoader.

Cybersecurity

Prepared in C++, it’s intended to collect delicate info from infected hosts and exfiltrate it to two Telegram channels, which are usually made use of by threat actors to extract victims’ details. Curiously, the latest exploration from Checkmarx showed that it truly is feasible to infiltrate and forward messages from an attacker’s bot to an additional Telegram account.

The development will come as Splunk specific the techniques and techniques adopted by Snake Keylogger, describing it as a stealer malware that “employs a multifaceted tactic to facts exfiltration.”

“The use of FTP facilitates the secure transfer of documents, when SMTP allows the sending of email messages containing sensitive data,” Splunk mentioned. “Furthermore, integration with Telegram presents a genuine-time interaction system, letting for quick transmission of stolen facts.”

Stealer malware have turn out to be more and more well known, usually turning into the principal vector for ransomware and other high affect knowledge breaches. According to a report from Specops printed this 7 days, RedLine, Vidar, and Raccoon have emerged as the most broadly-used stealers, with RedLine by itself accounting for the theft of a lot more than 170.3 million passwords in the last six months.

“The present rise of facts-stealing malware is a stark reminder of frequently evolving digital threats,” Flashpoint noted in January 2024. “Though the motivations behind its use is nearly always rooted in economical obtain, stealers are continuously adapting whilst currently being additional obtainable and less complicated to use.”

Observed this posting appealing? Adhere to us on Twitter  and LinkedIn to browse a lot more unique content material we submit.


Some parts of this write-up are sourced from:
thehackernews.com

Previous Post: «ghostrace – new data leak vulnerability affects modern cpus GhostRace – New Data Leak Vulnerability Affects Modern CPUs
Next Post: APT28 Hacker Group Targeting Europe, Americas, Asia in Widespread Phishing Scheme apt28 hacker group targeting europe, americas, asia in widespread phishing»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.