\"\"
<\/span><\/figcaption><\/figure>

New Delhi: Cyber-security researchers have unearthed that hackers are spreading a powerful malware<\/a> via news around the new Omicron<\/a> strain, stealing information and credentials from Windows users in at least 12 countries.

Researchers from cyber-security firm FortiGuard said that hackers are infecting devices with \"RedLine\" malware sent via emails, that steals all of the usernames and passwords it finds throughout an infected system.

\"FortiGuard Labs recently came across a curiously named file, 'Omicron Stats.exe' which turned out to be a variant of RedLine Stealer malware. While we have not been able to identify the infection vector for this particular variant, we believe that it is being distributed via email,\" the company said in a statement.

Based on the information collected by FortiGuard Labs, potential victims of this RedLine Stealer variant are spread across 12 countries.

\"This indicates that this is a broad-brush attack and that the threat actors did not target specific organisations or individuals,\" said the researchers.

The first reports of RedLine Stealer go back to at least March of 2020 and it quickly became one of the more popular infostealers sold in underground digital markets.

The Information harvested by RedLine Stealer is sold on the dark net marketplace for as low as $10 per set of user credentials.

The malware emerged just as the world began to deal with increased numbers of
Covid<\/a> patients and the growing fear and uncertainty that can cause people to lower their guard, which may have prompted its developers to use Covid as its lure.

\"Past RedLine Stealer variants are known to have been distributed in Covid-themed emails to lure victims. The file name of this current variant, 'Omicron Stats.exe', was used just as the Omicron variant was becoming a global concern, following the pattern of previous variants,\" said the researchers.

Given that this malware is embedded in a document designed to be opened by a victim, \"we have concluded that email is the infection vector for this variant as well\".

<\/body>","next_sibling":[{"msid":88871156,"title":"Apple South Korea's 2021 sales soar 24% to top $5.97bn","entity_type":"ARTICLE","link":"\/news\/apple-south-koreas-2021-sales-soar-24-to-top-5-97bn\/88871156","category_name":null,"category_name_seo":"telecomnews"}],"related_content":[],"msid":88874251,"entity_type":"ARTICLE","title":"Hackers spreading powerful malware via Omicron news emails","synopsis":"Cyber-security researchers have unearthed that hackers are spreading a powerful malware via news around the new Omicron strain, stealing information and credentials from Windows users in at least 12 countries.","titleseo":"telecomnews\/hackers-spreading-powerful-malware-via-omicron-news-emails","status":"ACTIVE","authors":[],"analytics":{"comments":0,"views":177,"shares":0,"engagementtimems":802000},"Alttitle":{"minfo":""},"artag":"IANS","artdate":"2022-01-13 14:23:31","lastupd":"2022-01-13 14:26:09","breadcrumbTags":["cybersecurity","covid","cororna","omicron","cybersecurity news","cyber crime","malware","internet"],"secinfo":{"seolocation":"telecomnews\/hackers-spreading-powerful-malware-via-omicron-news-emails"}}" data-authors="[" "]" data-category-name="" data-category_id="" data-date="2022-01-13" data-index="article_1">

黑客强大的恶意软件通过ο传播新闻邮件乐动扑克

网络安全研究人员发现,黑客是一个强大的恶意软件通过新闻传播新ο应变,窃取信息和从Windows用户凭证至少12个国家。乐动扑克

  • 更新2022年1月13日下午02:26坚持
阅读: 100年行业专业人士
读者的形象读到100年行业专业人士


新德里:网络安全研究人员发现,黑客是一个强大的传播恶意软件通过在新乐动扑克消息ο应变,窃取信息和从Windows用户凭证至少12个国家。

研究人员从网络安全公司FortiGuard说,黑客是用“歧视”恶意软件感染的设备通过电子邮件发送,偷走了所有的用户名和密码它发现在受感染的系统。

“FortiGuard实验室最近遇到了一个奇怪的是指定的文件,“ο统计数据。exe”原来是一个变种的歧视偷窃者恶意软件。虽然我们并没有能够识别感染向量这个特定的变体,我们相信通过电子邮件分发,”该公司在一份声明中说。

广告
基于FortiGuard实验室收集的信息,潜在受害者的歧视偷窃者变体分布在12个国家。

“这表明这是一个粗略的攻击和威胁演员没有目标特定的组织或个人,”研究人员说。

第一个报告排除偷窃者至少回到2020年3月,它很快成为一个更受欢迎的infostealers在地下数码市场出售。

收获的信息排除偷窃者黑暗网上销售市场低至10美元每组用户凭证。

恶意软件的出现就像世界开始处理数量的增加Covid病人和日益增长的恐惧和不确定性,可能导致人们降低,这可能促使其开发人员使用Covid诱惑。

“过去歧视偷窃者变体已知分布在Covid-themed邮件吸引受害者。当前版本的文件名称,“ο统计数据。exe”,就像使用ο变体是成为一个全球问题,此前发生的变异,”研究人员说。

鉴于这个恶意软件嵌入在文档设计成开了一个受害者,“我们得出的结论是,电子邮件是感染向量这个变体”。

  • 发表在2022年1月13日下午02:23坚持
是第一个发表评论。
现在评论

加入2 m +行业专业人士的社区

订阅我们的通讯最新见解与分析。乐动扑克

下载ETTelec乐动娱乐招聘om应用

  • 得到实时更新
  • 保存您最喜爱的文章
扫描下载应用程序
\"\"
<\/span><\/figcaption><\/figure>

New Delhi: Cyber-security researchers have unearthed that hackers are spreading a powerful malware<\/a> via news around the new Omicron<\/a> strain, stealing information and credentials from Windows users in at least 12 countries.

Researchers from cyber-security firm FortiGuard said that hackers are infecting devices with \"RedLine\" malware sent via emails, that steals all of the usernames and passwords it finds throughout an infected system.

\"FortiGuard Labs recently came across a curiously named file, 'Omicron Stats.exe' which turned out to be a variant of RedLine Stealer malware. While we have not been able to identify the infection vector for this particular variant, we believe that it is being distributed via email,\" the company said in a statement.

Based on the information collected by FortiGuard Labs, potential victims of this RedLine Stealer variant are spread across 12 countries.

\"This indicates that this is a broad-brush attack and that the threat actors did not target specific organisations or individuals,\" said the researchers.

The first reports of RedLine Stealer go back to at least March of 2020 and it quickly became one of the more popular infostealers sold in underground digital markets.

The Information harvested by RedLine Stealer is sold on the dark net marketplace for as low as $10 per set of user credentials.

The malware emerged just as the world began to deal with increased numbers of
Covid<\/a> patients and the growing fear and uncertainty that can cause people to lower their guard, which may have prompted its developers to use Covid as its lure.

\"Past RedLine Stealer variants are known to have been distributed in Covid-themed emails to lure victims. The file name of this current variant, 'Omicron Stats.exe', was used just as the Omicron variant was becoming a global concern, following the pattern of previous variants,\" said the researchers.

Given that this malware is embedded in a document designed to be opened by a victim, \"we have concluded that email is the infection vector for this variant as well\".

<\/body>","next_sibling":[{"msid":88871156,"title":"Apple South Korea's 2021 sales soar 24% to top $5.97bn","entity_type":"ARTICLE","link":"\/news\/apple-south-koreas-2021-sales-soar-24-to-top-5-97bn\/88871156","category_name":null,"category_name_seo":"telecomnews"}],"related_content":[],"msid":88874251,"entity_type":"ARTICLE","title":"Hackers spreading powerful malware via Omicron news emails","synopsis":"Cyber-security researchers have unearthed that hackers are spreading a powerful malware via news around the new Omicron strain, stealing information and credentials from Windows users in at least 12 countries.","titleseo":"telecomnews\/hackers-spreading-powerful-malware-via-omicron-news-emails","status":"ACTIVE","authors":[],"analytics":{"comments":0,"views":177,"shares":0,"engagementtimems":802000},"Alttitle":{"minfo":""},"artag":"IANS","artdate":"2022-01-13 14:23:31","lastupd":"2022-01-13 14:26:09","breadcrumbTags":["cybersecurity","covid","cororna","omicron","cybersecurity news","cyber crime","malware","internet"],"secinfo":{"seolocation":"telecomnews\/hackers-spreading-powerful-malware-via-omicron-news-emails"}}" data-news_link="//www.iser-br.com/news/hackers-spreading-powerful-malware-via-omicron-news-emails/88874251">