Dark Utilities: Off the shelf Command-And-Control Attacks...
Entities offering Cyberattacks-as-a-Service are fairly common and the newest member of the club, called Dark Utilities, is gaining popularity quickly.
Telephone
1 (877) 664-9379
Press "1" for Support
Press "2" for Sales
Press "3" for Finance
Headquarters
861 Lafayette Rd
Unit 4
Hampton, NH 03842
Raccoons! Trash pandas! Mother Nature's bandits. Those sneaky little devils. They'll be the ruination of us all! Okay, maybe not, but there is a new version of Raccoon Stealer that is making the rounds, and it's proving to be far more dangerous than the fuzzy bundles of chaos who constantly turn over your garbage cans.
The original Raccoon Stealer that launched in 2019 (via malware-as-a-service channels) was INCREDIBLY versatile. It could steal things like browser passwords, cookies, autofill data, and credit card numbers. You name it. If it was stored in your browser, and you were infected, Raccoon Stealer v1 could grab it.
When the development of Raccoon Stealer abruptly stopped in March of this year (2022), researchers knew it was only a matter of time before something new and improved took its place. That time is now, and Raccoon Stealer v2 is a doozy.
Not only can Raccoon Stealer v2 do all the things its predecessor could and more including:
How to Protect Yourself
So...this is going to sound really repetitive. Stop me if you've heard it before... Raccoon Stealer v2 installs/infects just like every other malware under the sun: via Phishing attacks.
If you've fallen out of your seat due to pure shock, I understand. Take the time you need to reconstitute yourself and we'll move on. Ready? Good.
Phishing attacks (or Phishing in general) is a type of Social Engineering Attack where individuals are targeted by email (or in some cases text messages). The attacker masquerades as someone else (a co-worker, manager, or individual from an outside organization) to manipulate their target.
The attacker's goal might be to steal sensitive information such as:
The attacker might also try to get their target to install malware on their end-point in order to compromise an organization's network for monetary or disruptive reasons.
There are anti-phishing products available to you (check out our partners Trustifi and Area1) that can really help get the job done. Honestly though, one of the BEST ways to avoid something like this is to educate your end-users. A well educated end-user is your best means of defense.
If you're interested in learning more, check out our BRAND NEW Social Engineering Attack Guide!
Entities offering Cyberattacks-as-a-Service are fairly common and the newest member of the club, called Dark Utilities, is gaining popularity quickly.
We talk a lot about being a Managed Cybersecurity Services Provider and I thought it'd be a good idea to dive into exactly what a Managed...
We've been warning people for YEARS regarding the dangers posed by Social Engineering Attacks. We decided it was time to collect all of that...