Most Common Infostealers in Our Region

September 4, 2024

Most Common Infostealers in Our Region
Image assisted/created by AI

By Guillermo Pereyra, Security Analyst at LACNIC

As a follow-up to the article Infostealers: Prevention and Protection against Information Theft, in this article we present a more detailed analysis of the three most common infostealers in our region.

As the image shows, in our region, the three most common infostealers are RedLine, Raccoon, and Lumma. While the three share the common goal of stealing credentials and sensitive information, they differ in their infection methods, the types of data they target, and their evasion capabilities. Below, we will analyze each of them in detail.

RedLine

The image above shows that RedLine (blue) is common in this region. Source: Mcafee.

(Free access, no subscription required)

This is a type of infostealer malware that can be purchased on underground forums. Once obtained, criminals distribute the malware to their victims through scam websites that impersonate legitimate software, such as VPN clients or online file converters. Recent versions have also been detected in counterfeit games.

When a user runs the malware on their computer, it immediately begins its malicious activity. First, RedLine performs an anti-forensics analysis of the infected system to avoid detection and analysis. It then communicates with the command-and-control (C2) server, which instructs the malware what actions to perform on the victim machine.

Next, the malware proceeds to extract sensitive user data, including:

The views expressed by the authors of this blog are their own and do not necessarily reflect the views of LACNIC.

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments