2 min read

Raccoon Malware Aims to Steal Credentials of People Who Use Popular Apps

Silviu STAHIE

February 26, 2020

Ad One product to protect all your devices, without slowing them down.
Free 90-day trial
Raccoon Malware Aims to Steal Credentials of People Who Use Popular Apps

Security researchers have followed the evolution of a piece of infostealer malware named Raccoon, as it’s being developed and enhanced to work in as many scenarios as possible, including email clients, Internet browsers, and more.

Infostealers are a type of malware designed for a very specific purpose, to steal credentials from as many sources as possible. Raccoon is one such tool that’s developed as a malware-as-a-service, which means it’s available to cybercriminals through various forums. More precisely, it’s rented at $75 per week or $200 per month, and deploying it doesn’t require extensive technical knowledge.

The Racoon malware, initially spotted in the wild in April 2019, was built to steal all kinds of information, such as credentials, credit card information, and even cryptocurrency wallets. Since it’s distributed as malware-as-a-service, it’s continuously adapted and enhanced to cover more and more avenues. As it stands, it covers almost 60 apps including email clients, most Internet browsers, and major cryptocurrency wallets.

This malware can spread to unsuspecting victims in two ways. One is through exploit kits embedded into a website to infect users with unpatched browsers and operating systems. The other is through phishing campaigns that persuade people to open a Microsoft Office email and run a macro script.

What’s interesting about this malware is that its developers are expanding features to include ever-more attack vectors.

“Raccoon targets 29 chromium-based browsers including Google Chrome, Opera, etc that have the same folder structure and share a similar codebase, which leads to a similar way of handling sensitive data,” explain the researchers.

“The stealer also relies on the same methodology for Mozilla based applications. When looking for cryptocurrency wallets, Racoon targets popular applications like Exodus, Jaxx and more.”

While this relatively new malware is not all that complex and dangerous, the fast rate of development makes it a favorite for attackers, especially since it doesn’t require programming experience. The best ways for people and companies to stay safe is to keep devices and software up to date, to use a security solution, and to be wary of potential phishing campaigns.

tags


Author



Right now

Top posts

August Spam Debrief: Bitdefender Labs Warns of Fraud Campaigns Exploiting the Russia-Ukraine War

August Spam Debrief: Bitdefender Labs Warns of Fraud Campaigns Exploiting the Russia-Ukraine War

August 31, 2022

4 min read
Snake Keylogger Returns in Malspam Campaign Disguised as Business Portfolio from IT Vendor

Snake Keylogger Returns in Malspam Campaign Disguised as Business Portfolio from IT Vendor

August 30, 2022

2 min read
What is medical identity theft and how to protect against it

What is medical identity theft and how to protect against it

July 27, 2022

2 min read
Curious about Omegle? Here’s how the roulette-style chat platform can threaten your online privacy and security

Curious about Omegle? Here’s how the roulette-style chat platform can threaten your online privacy and security

July 07, 2022

5 min read
Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

June 28, 2022

2 min read
Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

June 28, 2022

3 min read

FOLLOW US ON

SOCIAL MEDIA


You might also like

Prison for ex-eBay staff who aggressively cyberstalked company's critics with Craigslist sex party ads and funeral wreaths Prison for ex-eBay staff who aggressively cyberstalked company's critics with Craigslist sex party ads and funeral wreaths
Graham CLULEY

September 30, 2022

2 min read
Honolulu Man Sabotaged Former Employer’s Network and Business Using Still-Active Credentials Honolulu Man Sabotaged Former Employer’s Network and Business Using Still-Active Credentials
Silviu STAHIE

September 30, 2022

1 min read
North Korean Gang Uses Compromised Open Source Software to Distribute Malware, Researchers Find North Korean Gang Uses Compromised Open Source Software to Distribute Malware, Researchers Find
Silviu STAHIE

September 30, 2022

1 min read