Researchers warn about two types of data-stealing malware, dubbed FFDroider and Lightning Stealer, that are capable of siphoning data and launching further attacks.
Avinash Kumar and Niraj Shivtarkar of Zscaler ThreatLabz wrote in their report published last week that FFDroider is designed to send credentials and cookies to a command & control server by appearing as the instant messaging application Telegram on victims’ machines.
According to their name, information stealers harvest sensitive data from compromised machines, such as keystrokes, screenshots, files, saved passwords and cookies, which is then sent to a remote attacker’s web server.
FFDroider is distributed through cracked versions of installers and freeware with the primary objective of stealing cookies and credentials associated with popular social media and e-commerce platforms and using the plundered data to login into the accounts and capture other personal account-related information.
Web browsers targeted by the malware include Google Chrome, Mozilla Firefox, Internet Explorer, and Microsoft Edge. The websites targeted encompass Facebook, Instagram, Twitter, Amazon, eBay, and Etsy.
“The stealer signs into victims’ social media platforms using stolen cookies, and extracts account information like Facebook Ads-manager to run malicious advertisements with stored payment methods and Instagram via API to steal personal information,” the researchers said.
FFDroider also comes with a downloader functionality to upgrade itself with new modules from an update server that allows it expand its feature set over time, enabling malicious actors to abuse the stolen data as a vector for initial access to a target.
|Main Function of Lightning Stealer|
Lightning stealer operates in a similar fashion in that it can steal Discord tokens, data from cryptocurrency wallets, and details pertaining to cookies, passwords, credit cards, and search history from more than 30 Firefox and Chromium-based browsers, all of which is exfiltrated to a server in JSON format.
“Info Stealers are adopting new techniques to become more evasive,” Cyble researchers said, adding it “witnessed ransomware groups leveraging Info Stealers to gain initial network access and, eventually, exfiltrating sensitive data.”
The development comes as stealer malware is becoming an increasingly common occurrence across different attack campaigns in recent months, in part to fill the void left by Raccoon Stealer’s exit from the market in late March due to the ongoing war in Ukraine.
In February 2022, Cyble Research disclosed details of an emerging threat called Jester Stealer that’s engineered to steal and transmit login credentials, cookies, credit card information along with data from passwords managers, chat messengers, email clients, crypto wallets, and gaming apps to the attackers.
Since then, at least three different info-stealers have emerged in the wild, including BlackGuard, Mars Stealer, and META, the last of which has been observed delivered via malspam campaigns to collect sensitive data.
Some sections of this post are sourced from: thehackernews.com