article thumbnail

Internet Archive data breach impacted 31M users

Security Affairs

31M records breached The breach exposed user records including email addresses, screen names and bcrypt password hashes. HIBP confirmed that the stolen archive had 31M records, including email address, screen name, bcrypt password hash, and timestamps for password changes. Internet Archive hacked.

Archiving 302
article thumbnail

Glove Stealer bypasses Chrome’s App-Bound Encryption to steal cookies

Security Affairs

The malware could harvest a huge trove of data from infected systems, including cookies, autofill, cryptocurrency wallets, 2FA authenticators, password managers, and email client information. The campaign observed by researchers used a phishing message with an HTML file attachment.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

STRRAT RAT spreads masquerading as ransomware

Security Affairs

The Java-based STRRAT RAT was distributed in a massive spam campaign, the malware shows ransomware-like behavior of appending the file name extension.crimson to files without actually encrypting them. “The RAT has a focus on stealing credentials of browsers and email clients, and passwords via keylogging.

article thumbnail

FBI published a flash alert on Mamba Ransomware attacks

Security Affairs

“Once encrypted, the system displays a ransom note including the actor’s email address, ransomware file name, the host system name, and a place to enter the decryption key.” If DiskCryptor is not used by the organization, add the key artifact files used by DiskCryptor to the organization’s execution blacklist. .

article thumbnail

Fake Falcon crash reporter installer used to target German Crowdstrike users

Security Affairs

The installer featured CrowdStrike branding, German language localization, and required a password to install malware. This spearphishing page presented the targeted victim with a download link to a ZIP file containing a malicious InnoSetup installer.” com/crowdstrike/. “The website it[.]com dat and Java8Runtime.exe ).

Passwords 359
article thumbnail

Attackers use a new CoronaVirus Ransomware to cover Kpot Infostealer infections

Security Affairs

The website was distributing a file named WSHSetup.exe, it is the downloader for both the CoronaVirus Ransomware and the Kpot password-stealer. Upon execution, the executable will attempt to download several files from a remote web site, at the time of the analysis, only a few of them were available.

article thumbnail

“gitgub” malware campaign targets Github users with RisePro info-stealer

Security Affairs

The researchers noticed that the users must unpack several layers of archives using the password “GIT1HUB1FREE,” which is provided in the README.md file, to access the installer named “Installer_Mega_v0.7.4t.msi.” All unique passwords are stored in a file named “brute.txt”.

Passwords 348