
[ad_1]

Cybersecurity researchers are warning of a new campaign that leverages cracked versions of software as a lure to distribute information stealers like Lumma and ACR Stealer.
The AhnLab Security Intelligence Center (ASEC) said it has observed a spike in the distribution volume of ACR Stealer since January 2025.
A notable aspect of the stealer malware is the use of a technique called dead drop
[ad_2]
Source link
Related posts:
Stay Safe Online: Essential Tips for Safer Internet Day
Technology
Is Your Phone Your Best Friend or a Silent Spy?
Technology
Wipe Your Digital Footprints with Data Wipe Software
Technology
No, you’re not fired – but beware of job termination scams
Technology
DeceptiveDevelopment targets freelance developers
Technology
Fake job offers target coders with infostealers
Technology
Belarus-Linked Ghostwriter Uses Macropack-Obfuscated Excel Macros to Deploy Malware
Technology
LightSpy Expands to 100+ Commands, Increasing Control Over Windows, macOS, Linux, and Mobile
Technology
CISA Adds Microsoft and Zimbra Flaws to KEV Catalog Amid Active Exploitation
Technology
Malicious PyPI Package "automslc" Enables 104K+ Unauthorized Deezer Music Downloads
Technology
CERT-UA Warns of UAC-0173 Attacks Deploying DCRat to Compromise Ukrainian Notaries
Technology
Three Password Cracking Techniques and How to Defend Against Them
Technology
New Linux Malware ‘Auto-Color’ Grants Hackers Full Remote Access to Compromised Systems
Technology
SOC 3.0 - The Evolution of the SOC and How AI is Empowering Human Talent
Technology
Leaked Black Basta Chat Logs Reveal $107M Ransom Earnings and Internal Power Struggles
Technology
Microsoft: Russian-Linked Hackers Using 'Device Code Phishing' to Hijack Accounts
Technology
AI-Powered Social Engineering: Ancillary Tools and Techniques
Technology
Lazarus Group Deploys Marstech1 JavaScript Implant in Targeted Developer Attacks
Technology
New “whoAMI” Attack Exploits AWS AMI Name Confusion for Remote Code Execution
Technology
Android's New Feature Blocks Fraudsters from Sideloading Apps During Calls
Technology
New Golang-Based Backdoor Uses Telegram Bot API for Evasive C2 Operations
Technology
⚡ THN Weekly Recap: Google Secrets Stolen, Windows Hack, New Crypto Scams and More
Technology
CISO's Expert Guide To CTEM And Why It Matters
Technology
South Korea Suspends DeepSeek AI Downloads Over Privacy Violations
Technology
Microsoft Uncovers New XCSSET macOS Malware Variant with Advanced Obfuscation Tactics
Technology
Cybercriminals Exploit Onerror Event in Image Tags to Deploy Payment Skimmers
Technology
New Xerox Printer Flaws Could Let Attackers Capture Windows Active Directory Credentials
Technology
Winnti APT41 Targets Japanese Firms in RevivalStone Cyber Espionage Campaign
Technology
Juniper Session Smart Routers Vulnerability Could Let Attackers Bypass Authentication
Technology
Debunking the AI Hype: Inside Real Hacker Tactics
Technology
Build a website that pays you back with real revenue.



















