Most Common Infostealers in Our Region

04/09/2024

Most Common Infostealers in Our Region
Image assisted/created by AI

By Guillermo Pereyra, Security Analyst at LACNIC

As a follow-up to the article Infostealers: Prevention and Protection against Information Theft, in this article we present a more detailed analysis of the three most common infostealers in our region.

As the image shows, in our region, the three most common infostealers are RedLine, Raccoon, and Lumma. While the three share the common goal of stealing credentials and sensitive information, they differ in their infection methods, the types of data they target, and their evasion capabilities. Below, we will analyze each of them in detail.

RedLine

The image above shows that RedLine (blue) is common in this region. Source: Mcafee.

This is a type of infostealer malware that can be purchased on underground forums. Once obtained, criminals distribute the malware to their victims through scam websites that impersonate legitimate software, such as VPN clients or online file converters. Recent versions have also been detected in counterfeit games.

When a user runs the malware on their computer, it immediately begins its malicious activity. First, RedLine performs an anti-forensics analysis of the infected system to avoid detection and analysis. It then communicates with the command-and-control (C2) server, which instructs the malware what actions to perform on the victim machine.

Next, the malware proceeds to extract sensitive user data, including:

(Free access, no subscription required)

  • Information about the victim system.
  • Credentials, cookies, credit card details, and social media links stored in the victim’s browsers.
  • FTP client data (FileZilla, WinSCP).
  • Instant messaging client data.
  • Cryptocurrency wallets; and
  • Specific files requested by the C2 server.

Once the malware gathers the desired information, it obfuscates (disguises) and encrypts the data before sending it to the cybercriminal’s C2 servers.

Leer también:

Raccoon

The first versions of this malware were observed in 2019 on cybercriminal forums, where it was offered as Malware-as-a-Service (MaaS). Despite the arrest of its primary developer and the dismantling of its infrastructure, Raccoon returned in 2023 with a new version, available by subscription on underground forums.

This updated version of the malware includes the following features:

The views expressed by the authors of this blog are their own and do not necessarily reflect the views of LACNIC.

Subscribe
Notify of

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments