Lightning Stealer is a malware threat designed to extract sensitive information from operating systems and make it available to their operators. This piece of malware was first detected by information security researcher as 3xp0rt on Twitter. Apparently, its creators are offering the Lightning Stealer for sale on hacker forums so it can become quite expandable.

Lightning Stealer appears to be targeting specific messaging apps, such as Telegram and Discord. It can also mine data from cryptocurrency wallets and the game platform and Steam store. Information collected includes victim account credentials, passwords, and browser cookies. With the information at their disposal, cybercriminals can expand their reach to take over personal accounts, assume the victim’s identity, make fraudulent purchases, or siphon funds held in the victim’s crypto wallet accounts.

Cybercriminals distribute malware via emails, rogue software decryption tools (or decryption software installers), untrustworthy sources for downloading files and programs, fake updaters. Their goal is to trick users into running malware (malicious files) on their own.

Threat authors who use emails to deliver malware typically impersonate legitimate companies or other entities. They send emails containing malicious attachments or links to web pages so you should not fall for these scams.

Remember that you should only download files and programs from official and legitimate websites. Always use direct download links. Do not open downloads from untrustworthy sources and links or attachments received from unknown addresses. Especially when email tales are not relevant also, use the tools provided by official developers to update and activate installed programs.


Deja un comentario

Tu dirección de correo electrónico no será publicada. Los campos obligatorios están marcados con *