One such marketplace, Genesis, was the apparent source for a cookie belonging to an employee of the game developer Electronic Arts. At the bottom end of the cybercrime range, information-stealing malware such as the Raccoon Stealer malware-as-a-service and the RedLine Stealer keylogger / information stealer-both of which can be purchased through underground forums-are often used by entry-level criminals to collect cookies and other credentials in bulk for sale to criminal marketplaces. The range of criminals targeting cookies is broad. Google’s Chrome browser uses the same encryption method to store both multi-factor authentication cookies and credit card data-both targets of Emotet. The latest version of the Emotet botnet is just one of the many malware families that target cookies and other credentials stored by browsers, such as stored logins and (in some cases) payment card data. Attackers are increasingly turning to stealing the “cookies” associated with credentials to clone active or recent web sessions-bypassing MFA in the process. While user account names and passwords are the most obvious targets of credential-stealing activities, the increased use of multi-factor authentication (MFA) to protect web-based services has reduced the effectiveness of that approach. Credential-stealing malware is an integral part of the toolkit used by a wide variety of cybercriminals and other adversaries.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |