Hackers mainly aim at Windows systems as they are widely adopted and dominate the market, consequently, threat actors will achieve maximum financial gain or theft of data from them compared to other operating systems.
In addition, the presence of numerous entry points due to the complexity of the Windows operating system and the diversity of applications running on it creates various vulnerabilities that can be adopted for explorations.
Also, the presence of hacking tools and malware that exclusively affect only Windows-based machines is a contributing factor to their popularity among threat actors.
Cybersecurity researchers at CYFIRMA recently detected that Samstealer had been actively attacking Windows systems to steal sensitive data.
ANYRUN malware sandbox’s 8th Birthday Special Offer: Grab 6 Months of Free Service
A new .NET malware named “SamsStealer” spreads through Telegram with the aim of stealing sensitive files on Windows.
It creates a temp folder and then proceeds to steal passwords, cookies, and other information from different browsers such as Chrome, Edge, and cryptocurrency wallets.
It also focuses on stealing account details about Telegram, Discord, etc., including tokens or wallet content. Cyfirma said the stolen data is saved in a temporary folder and converted into exfiltration files.
Detailed knowledge would enable users to detect evolving info stealer threats by determining its ability for data theft on numerous applications.
Here below we have mentioned cryptocurrency wallets that are targeted:-
As soon as the data is stolen, SamsStealer empties temporary files, packs all that is stolen into “Backup.zip,” and erases the parent directory.
Then it uploads Backup.zip to gofile.io and shares the download link via Telegram with a message reading “New goat Detected, Join Now: @SamsExploit.”
This silent malware effectively steals a variety of sensitive data across browsers, applications, and crypto wallets on Windows devices targeted by users.
Knowing these emerging threats is important in structuring defensive strategies to prevent possible intrusions that may lead to compromising privacy and data breaches.
Here below we have mentioned all the recommendations:-
Free Webinar on Live API Attack Simulation: Book Your Seat | Start protecting your APIs from hackers
A sophisticated phishing campaign targeting Turkish defense and aerospace enterprises has emerged, delivering a highly…
A sophisticated Chinese threat actor campaign has emerged as one of the most persistent malware…
A sophisticated phishing campaign targeting organizations has emerged, exploiting the trusted reputation of Veeam Software…
A critical zero-day flaw in the CrushFTP managed file-transfer platform was confirmed after vendor and…
A sophisticated phishing campaign dubbed "Scanception" has emerged as a significant threat to enterprise security,…
The cybersecurity landscape continues to face significant threats from sophisticated information stealers, with Lumma emerging…