![]() The results of credential theft can be devastating. Alternatively, however, they may install information-stealing malware (i.e, info-stealers) onto users’ devices. ![]() They may, for example, distribute phishing emails which trick their recipients into divulging account credentials. Threat actors have several means available to them for obtaining account credentials. The misuse of stolen account credentials is a primary method used by threat actors to gain initial access to target environments. In the follow-up post, we will provide details about the surge in Raccoon Stealer v2 cases that Darktrace’s SOC has observed since May 2022. We will first shed light on how Raccoon Stealer functioned before its demise, by providing details of a Raccoon Stealer v1 infection which Darktrace’s SOC saw within a client network on the 18 th March 2022. ![]() In this series of blog posts, we will follow the development of Raccoon Stealer between March and September 2022. ![]() In May 2022, Raccoon Stealer v2 was unleashed onto the world, with huge numbers of cases being detected across Darktrace’s client base. Towards the end of March 2022, the operators of Raccoon Stealer announced the closure of the Raccoon Stealer project. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |