Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Facebook X (Twitter) Instagram
    Tech Empire Solutions
    • Home
    • Cloud
    • Cyber Security
    • Technology
    • Business Solution
    • Tech Gadgets
    Tech Empire Solutions
    Home » Hackers use cracking software on GitHub to spread RisePro information-stealing program
    Cyber Security

    Hackers use cracking software on GitHub to spread RisePro information-stealing program

    techempireBy techempire1 Comment3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email

    ReportMarch 16, 2024Editorial DepartmentMalware/cybercrime

    Cracked software on GitHub

    Cybersecurity researchers have discovered a number of GitHub repositories offering cracking software used to spread an information-stealing program called RisePro.

    The event is codenamed githubAccording to G DATA, 17 repositories related to 11 different accounts are included. The relevant repository has since been deleted by a Microsoft subsidiary.

    “The repositories look similar, have a README.md file and promise to provide free cracking software,” the German cybersecurity company said.

    “Green and red circles are commonly used on Github to display the status of automated builds. The Gitgub threat actors added four green Unicode circles to their README.md, pretending to display status next to the current date and providing legitimacy and recency a feeling of. “

    Internet security

    The repository list is as follows, each repository points to a download link (“digitalxnetwork[.]com”) contains RAR archives –

    • andreastanaj/AVAST
    • andreastanaj/voice booster
    • aymenkort1990/fabfilter
    • BenWebsite/-IObit-Smart-Defrag-Cracked
    • Faharnaqvi/VueScan-Cracked
    • javisolis123/Voicemod
    • lolusuary/Aomei Backup
    • lolusuary/daemon tools
    • lolusuary/EaseUS-Partition Master
    • lolusuary/SOOTHE-2
    • mostofakamaljoy/ccleaner
    • rik0v/ManyCam
    • Roccinhu/Tenorshare-Reiboot
    • Roccinhu/Tenorshare-iCareFone
    • True-Oblivion/Aomei-Partition Assistant
    • vaibhavshiledar/droidkit
    • vaibhavshiledar/TOON-BOOM-HARMONY

    The RAR file asks the victim to provide the password mentioned in the repository’s README.md file, which contains an installer file that unpacks the next stage of the payload, an executable file that bloats to 699 MB and is designed to Crash analysis tools such as IDA Professional.

    The actual contents of the file (which totals only 3.43 MB) act as a loader, injecting RisePro (version 1.6) into AppLaunch.exe or RegAsm.exe.

    RisePro burst into the spotlight in late 2022 when it was distributed using a pay-per-install (PPI) malware download service called PrivateLoader.

    Internet security

    Written in C++, it is designed to collect sensitive information from compromised hosts and infiltrate it into two Telegram channels, which are often used by threat actors to extract victims’ data. Interestingly, recent research from Checkmarx shows that it is possible to penetrate an attacker’s bot and forward messages to another Telegram account.

    Splunk detailed the strategies and techniques used by Snake Keylogger, describing it as a stealth malware that “employs a multifaceted approach to exfiltrate data.”

    “The use of FTP facilitates the secure transfer of files, while SMTP enables the sending of emails containing sensitive information,” Splunk said. “In addition, integration with Telegram provides an instant messaging platform that allows for the immediate transfer of stolen data.”

    Stealer malware is becoming increasingly popular, often serving as a primary vector for ransomware and other high-impact data breaches. According to a report released this week by Specops, RedLine, Vidar, and Raccoon have become the most widely used stealers, with RedLine alone stealing more than 170.3 million passwords in the past six months.

    Flashpoint noted in January 2024: “The current rise of information-stealing malware is a stark reminder that digital threats are constantly evolving. While the motivations behind their use are almost always rooted in financial gain, stealers are constantly adapting and becoming more sophisticated. Easy to get and use.” Easier to use. “

    Did you find this article interesting?follow us Twitter  and LinkedIn to read more exclusive content from us.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    techempire
    • Website

    Related Posts

    Ongoing campaign bombards businesses with spam emails and phone calls

    6 common mistakes organizations make when deploying advanced authentication

    New Chrome zero-day vulnerability CVE-2024-4761 is being actively exploited

    Microsoft patches 61 flaws, including two actively exploited zero-day vulnerabilities

    Dutch court sentences Tornado Cash co-founder to 5 years in prison for money laundering

    Migrate from VMware vSphere to Microsoft Azure

    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Legal Pages
    • About Us
    • Disclaimer
    • DMCA
    • Privacy Policy
    Our Picks

    Gateway Studios High-Tech Recording Studio To Open In Chesterfield, Missouri

    Edufox

    Emerging Academic Education Platforms – Sponsored By Edufox

    Top Reviews

    Type above and press Enter to search. Press Esc to cancel.