• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
researchers warn of "eternity project" malware service being sold via

Researchers Warn of “Eternity Project” Malware Service Being Sold via Telegram

You are here: Home / General Cyber Security News / Researchers Warn of “Eternity Project” Malware Service Being Sold via Telegram
May 16, 2022

An unknown threat actor has been connected to an actively in-growth malware toolkit called the “Eternity Project” that allows experienced and amateur cybercriminals buy stealers, clippers, worms, miners, ransomware, and a dispersed denial-of-services (DDoS) bot.

What will make this malware-as-a-services (MaaS) stand out is that other than using a Telegram channel to communicate updates about the hottest attributes, it also employs a Telegram Bot that permits the purchasers to create the binary.

“The [threat actors] provide an option in the Telegram channel to customize the binary characteristics, which provides an productive way to construct binaries without having any dependencies,” scientists from Cyble mentioned in a report posted final week.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Every of the modules can be leased individually and delivers compensated access to a broad wide range of functions –

  • Eternity Stealer ($260 for an annual subscription) – Siphon passwords, cookies, credit history cards, browser cryptocurrency extensions, crypto wallets, VPN consumers, and email applications from a victim’s device and sends them to the Telegram Bot
  • Eternity Miner ($90 as an yearly membership) – Abuse the computing resources of a compromised equipment to mine cryptocurrency
  • Eternity Clipper ($110) – A crypto-clipping plan that steals cryptocurrency during a transaction by substituting the first wallet address saved in the clipboard with the attacker’s wallet address.
  • Eternity Ransomware ($490) – A 130kb ransomware executable to encrypt all of the users’ files until finally a ransom is paid out
  • Eternity Worm ($390) – A malware that propagates via USB Drives, nearby network shares, community data files as very well as via spam messages broadcasted on Discord and Telegram.
  • Eternity DDoS Bot (N/A) – The attribute is explained to be currently under development.

Cyble pointed out there are indications that the malware authors may perhaps be repurposing existing code relevant to DynamicStealer, which is obtainable on GitHub, and buying and selling it below a new moniker for revenue.

It truly is truly worth noting that Jester Stealer, one more malware that came to light-weight in February 2022 and has since been place to use in phishing attacks from Ukraine, also makes use of the same GitHub repository for downloading TOR proxies, indicating feasible back links among the two risk actors.

CyberSecurity

The cybersecurity organization also mentioned it “has noticed a important boost in cybercrime as a result of Telegram channels and cybercrime discussion boards where by [threat actors] provide their solutions without any regulation.”

Just last 7 days, BlackBerry exposed the interior workings of a distant obtain trojan named DCRat (aka DarkCrystal RAT) that is readily available for sale at low-priced selling prices on Russian hacking community forums and makes use of a Telegram channel for sharing details about computer software and plugin updates.

Identified this post fascinating? Follow THN on Fb, Twitter  and LinkedIn to examine much more special material we put up.


Some parts of this posting are sourced from:
thehackernews.com

Previous Post: «it admin deletes company’s databases and is jailed for seven IT admin deletes company’s databases and is jailed for seven years
Next Post: Fake Clickjacking Bug Bounty Reports: The Key Facts fake clickjacking bug bounty reports: the key facts»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.