Artwork

内容由CYFIRMA提供。所有播客内容(包括剧集、图形和播客描述)均由 CYFIRMA 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal
Player FM -播客应用
使用Player FM应用程序离线!

CYFIRMA Research: Lumma Stealer-Tactics, Impact, and Defense Strategies

3:27
 
分享
 

Manage episode 426555290 series 3472819
内容由CYFIRMA提供。所有播客内容(包括剧集、图形和播客描述)均由 CYFIRMA 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal

Cyfirma research team has examined a variant of Lumma Stealer malware, and this report provides a comprehensive analysis of this advanced information-stealing malware, explores the tactics employed by threat actor to evade detection on the system and over the network, as well as their techniques for concealing malicious code and activities. Lumma Stealer targets sensitive data by employing sophisticated techniques, and utilizes counterfeit websites posing as legitimate antivirus software for distribution and promotion.

Lumma Stealer, a potent malware written in C, is designed to surreptitiously steal a wide array of data from compromised systems. It has rapidly gained notoriety for its ability to target and steal critical data such as cryptocurrency wallets, web browser information, email credentials, financial data, sensitive files within user directories, personal data, FTP client data and more by employing sophisticated techniques including event-controlled write operations and encryption to evade detection and maximize its impact.

Link to the Research Report: Lumma Stealer: Tactics, Impact, and Defense Strategies - CYFIRMA
#Cyfirma #CyberSecurity #Lumma Stealer #Malware-as-a-Service #MalwareAnalysis #CyfirmaResearch #ThreatIntelligence #ExternalThreatLandscapeManagement #ETLM

https://www.cyfirma.com/

  continue reading

167集单集

Artwork
icon分享
 
Manage episode 426555290 series 3472819
内容由CYFIRMA提供。所有播客内容(包括剧集、图形和播客描述)均由 CYFIRMA 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal

Cyfirma research team has examined a variant of Lumma Stealer malware, and this report provides a comprehensive analysis of this advanced information-stealing malware, explores the tactics employed by threat actor to evade detection on the system and over the network, as well as their techniques for concealing malicious code and activities. Lumma Stealer targets sensitive data by employing sophisticated techniques, and utilizes counterfeit websites posing as legitimate antivirus software for distribution and promotion.

Lumma Stealer, a potent malware written in C, is designed to surreptitiously steal a wide array of data from compromised systems. It has rapidly gained notoriety for its ability to target and steal critical data such as cryptocurrency wallets, web browser information, email credentials, financial data, sensitive files within user directories, personal data, FTP client data and more by employing sophisticated techniques including event-controlled write operations and encryption to evade detection and maximize its impact.

Link to the Research Report: Lumma Stealer: Tactics, Impact, and Defense Strategies - CYFIRMA
#Cyfirma #CyberSecurity #Lumma Stealer #Malware-as-a-Service #MalwareAnalysis #CyfirmaResearch #ThreatIntelligence #ExternalThreatLandscapeManagement #ETLM

https://www.cyfirma.com/

  continue reading

167集单集

所有剧集

×
 
Loading …

欢迎使用Player FM

Player FM正在网上搜索高质量的播客,以便您现在享受。它是最好的播客应用程序,适用于安卓、iPhone和网络。注册以跨设备同步订阅。

 

快速参考指南