This podcast episode features a discussion on the evolving landscape of infostealers, highlighting new malware capabilities and delivery methods. It emphasizes the significant rise in cyber-attacks involving infostealers and suggests ways for individuals and organizations to safeguard themselves.
Affected: individuals, organizations
Affected: individuals, organizations
Keypoints :
- Hudson Rock’s podcast features Leonid Rozenberg discussing infostealers.
- Infostealers are responsible for 4.3 million device infections and 3.9 billion stolen passwords.
- Infostealers are now involved in 25% of all cyber-attacks.
- They utilize advanced malware features like file-grabbing and credit card theft.
- New delivery methods include fake CAPTCHA attacks and the ClickFix method.
- The episode discusses prevention and mitigation strategies for infostealer threats.
- Hudson Rock offers a cybercrime intelligence API and free tools for cyber protection.
- Listeners can learn more about the latest trends in infostealer development and distribution.
MITRE Techniques :
- Credential Dumping (T1003) – Infostealers harvest passwords stored in browsers.
- Data from Information Repositories (T1213) – Infostealers utilize file-grabbing modules to access sensitive files.
- Exploitation for Client Execution (T1203) – Delivery methods include fake CAPTCHA attacks to trick users.
- Supply Chain Compromise (T1195) – The ClickFix method is mentioned as a delivery strategy.
Indicator of Compromise :
- [URL] https://www.hudsonrock.com/schedule-demo
- [URL] www.hudsonrock.com/free-tools
- [Email] Info@hudsonrock.com