One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Blog
Identifiant 937528
Date de publication 2018-12-06 14:00:00 (vue: 2018-12-06 16:00:52)
Titre Password Stealers Aren\'t Letting up Any Time Soon
Texte Password security has always been a challenge. Brute force attacks are constantly getting more powerful, but they aren’t the only threat you have to worry about. A range of password stealing malware continues to grow in popularity. One example, Agent Tesla, has seen its detection rate grow 100% in just three months, according to data from LastLine. Despite this rapid growth, Agent Tesla is far from the most popular. That title goes to Pony, which represents 39% of the total password stealer detections, according to Blueliv’s 2018 report, The Credential Theft Ecosystem. LokiPWS and KeyBase trailed Pony at 28% and 16%, respectively. These password stealers are each capable of stealing credentials and other information from a wide variety of programs. Each is unique with its own techniques for delivery and a range of features that hackers can use to mount attacks. Despite the differences, each of these programs can have severe impacts on their victims. The negative impacts can range from having all of the money stolen from an individual’s accounts, to the theft of a company’s intellectual property. The key features of some of the most common password stealers are listed below: Agent Tesla Like most password stealers, Agent Tesla can access a wide variety of your information, ranging from your credentials to your keystrokes. It can even take screenshots and videos from your device’s camera. Agent Tesla targets a number of major programs, including web browsers, email clients, FTP applications and other commonly used software. Once Agent Tesla has been installed on a target’s computer, it can also be used to download other malware. This feature allows threat actors to intensify their attacks and make them even more devastating. Its pricing shows that the malware industry hasn’t been left behind in the X-as-a-service boom, because it is available as part of a plan that starts from $15 per month. This price includes all the 24/7 support someone might need to assist them in their criminal endeavors. Of course, payments are made in Bitcoin. Despite running what must have been an incredibly profitable business, Agent Tesla’s creators have recently posted an update stating it will crack down on illegal use of the program. Under its terms of service, it declares that the software must only be used within the law, but features such as anti-antivirus throw these intentions into question. Due to the recent media attention that Agent Tesla has received, the developers will strip some of its more questionable features, such as anti-antivirus and webcam capture. They also claim to be banning those who are using the program maliciously. Only time will tell whether the creators are sincere, or if this is merely an attempt to keep the authorities from knocking down their doors. Pony Pony is currently the most popular password stealer, but it’s certainly not new. In the past, it has been used to control a number of enormous botnets, which by 2013 had already stolen more than two million credential sets. In 2014, it involved into a series of attacks that stole $200,000 worth of cryptocurrencies, as well as 700,000 sets of credentials. In recent years, Pony has seen prominence as a loader alongside other malware, such as CryptoWall and Angler. These programs, a type of ransomware and an exploit kit, respective
Envoyé Oui
Condensat able absolute acceptable access accessed account active activity actor actors addition adequate after against agent all allows also amounts another any app applications are aren aren’t array aspects attachments attacker attacker’s attackers attacks attempt authentication authenticator aware away back bank because been being best biometric break broad browsers build bulk businesses but camera can certain check chrome claim clear clearly clients clipboard clipboards code collected comfortable commit common commonly company’s complete completely complexity computer conduct controlling copy core costly course credentials crucial culture cybersecurity dashboard dashboards data deeply despite device’s difficult disastrous does doing each easily easy edge either elements email employees enable enables encourage erase especially even ever every example extortion face factor features feel filezilla finished focus following from ftp further gateways get give goes grant greater guard hands has have helps hijack how hundred identity imagination impact impacts implementing important impressive include incredible individuals information input inside intellectual issue it’s its keep keyloggers keystroke keystrokes large legitimate less letting level like lives lock log majority make makes malware manager manually many may means media menus microsoft mitigator money more most mount much need now number once one online only open opera organization organizations other outlook part parts password passwords pasting penetrate personal pictures potential practices prevention probably process processes profile programs progress property provide ransomware reaching record reduce remove represent requires results risks safari safe same screenshots secure security see sell send sending sent server set show shows significant significantly sms social some somewhat soon staff staying steal stealers stealing stored straight surefire surreptitiously systems take target target’s targets tend tesla’s than theft them then these things those threat threats time token tools track training two types unfortunately unsure use used useful user usernames uses valuable variety vary victims video videos vigilant way web what whenever where which whose wide will winscp withdraw work workplace worlds worrying your yourself
Tags Malware Threat
Stories Tesla
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: