Reliable Technology ServicesReliable Technology ServicesReliable Technology ServicesReliable Technology Services
Menu
  • Home
  • About Us
  • Services
    • Managed IT Services
      • Remote Monitoring & Maintenance
      • Onsite and Remote Support
      • Managed Security Services
    • Cloud Services
      • Cloud Email Solutions
      • Managed Backup Services
      • Cloud Data Storage Solutions
    • IT Consulting
      • Disaster Recovery & Business Continuity
      • IT Vendor Management Services
      • Network Infrastructure Planning, Design & Implementation
    • Cybersecurity
      • Employee Cybersecurity Training
      • Penetration Testing & Vulnerability Scanning
      • Cybersecurity Risk Assessments, Software and Services
  • FAQ’s
  • Blog
  • Contact

Raccoon Stealer Malware: What You Need to Know

  • Home
  • Blog
  • Raccoon Stealer Malware: What You Need...

Raccoon Stealer Malware: What You Need to Know

CategoriesInformation Security

Rick Ornato

August 21, 2022

0 0

Share this post

First making real headlines in 2019, the Raccoon Stealer malware originated on the Dark Web and quickly proliferated. This isn’t just because the sole perpetrator got busy, but because they’re able to sell subscriptions to buyers on the Dark Marketplace. Thanks to what’s known as malware-as-a-service, threat actors quickly overtook hundreds of thousands of devices.

Operations briefly ceased following the Russian invasion of Ukraine, or so the developers claimed. Reportedly one of their group members had been killed in the conflict and they ceased operations for several months. Raccoon Stealer went quiet.

Just three years after its initial discovery, though, Zscaler analysts indicate that a new version of the Raccoon Stealer malware is back with greater challenges for the machines it infects.

How It Works

This particular infection goes by several monikers. Also known as Legion, Mohazo and Racealer, it is actually a trojan which disguises itself as a benign file or program to convince you to download or click on the link. After it’s on your device, the hidden malware executes.

Cybercriminals who use Raccoon Stealer can also purchase logs of stolen information directly. Instead of launching the attack, they simply buy, for example, a bundle consisting of your Facebook login information. Then the purchaser can log on, blast phishing messages to all of your friends and even steal money or crypto funds.

Trojans rely on appearing like legitimate software, so you have to slow down and really assess new files before downloading them. In 2022, Trojans made up more than half of malware infections around the world.

Raccoon Stealer 2.0

Raccoon Stealer malware infects targeted machines to steal credentials from their users. The malware is capable of all kinds of malicious acts, such as…

  • Targeting particular apps
  • Recording fingerprint information
  • Stealing passwords and log-in information, especially autofill data
  • Stealing saved cards and cryptocurrency
  • Viewing cookies, programs and more
  • Access your downloaded programs, as well as all of their data
  • Using hacked accounts for purchases

The new version that has been infecting machines in 2022 is much more effective at completing these awful goals. The new malware is written in a different programming language (C as opposed to C++) which is slightly smaller and therefore works faster, though lacking various features. However, this also happens to make it more efficient at committing theft than the first Raccoon Stealer malware.

The newer version is also capable of running on both 32- and 64-bit systems without dependencies. In summary, it’s a dangerous variant that is projected to grow more capable and remain a household name.

Conclusion

Regularly update your antivirus software to best protect yourself against the Raccoon Stealer trojan, as well as any other malware you might come up against in the future. Automated system scanners alert you instantly to suspicious activity, while Dark Web monitoring can tell you as soon as your PII (personal identifiable information) appears on the dark marketplace for cybercriminals like Raccoon Stealer subscribers to purchase.

Be on the lookout for new viruses and updated versions of old threats! Active monitoring, hardware upgrades and software updates, and antivirus software are just a few of the tools available to help guard your devices against cybercriminals.

Follow our blog for the latest tips in avoiding cybercriminal threats and remaining cyber-safe!

References

  • https://www.infosecurity-magazine.com/news/credential-stealer-malware-raccoon/
  • https://www.bleepingcomputer.com/news/security/raccoon-stealer-malware-suspends-operations-due-to-war-in-ukraine/
  • https://any.run/malware-trends/raccoon
  • https://careerkarma.com/blog/c-plus-plus-vs-c/
  • https://www.pcrisk.com/removal-guides/15049-racoon-stealer-spyware
  • https://dataprot.net/statistics/malware-statistics/

Related Post

JULY 31, 2023

3 Smart Ways to Hide Your...

Our modern world is extremely digitized; because of that, we constantly use...

00

JULY 24, 2023

Consumer Financial Protection...

Consumer Financial Protection Bureau, commonly known as CFPB, is a government agency...

00

JULY 17, 2023

How Well Do You Know Your...

The faster you can identify suspicious activity on your network, the faster you can...

00

JULY 10, 2023

Beginning of the End? Behind...

Since bursting onto the scene in November 2022, ChatGPT has changed the game for...

00

JULY 3, 2023

A Real Pain: CACTUS...

Virtual private networks, more commonly known as VPNs, have long been touted as a more...

00

JUNE 29, 2023

Crash Course in Keylogging:...

What if threat actors could see everything that you did online? Everything you searched,...

00

Managed IT Services

  • Managed IT Services
    • Onsite and Remote Support
    • Remote Monitoring & Maintenance
    • Managed Security Services
Get a free IT Consultation
Contact Us

© 2018 Reliable Technology Services, All Rights Reserved.