Get a Pentest and security assessment of your IT network.

Cyber Security

Zebrocy Operators Also Look for Browser and Email Databases

Malware researchers analyzed the Zebrocy kit determined that the operators run commands manually to collect information of interest from infected systems. This includes attractive data that ranges from documents and pictures to databases stored by web browsers and email clients. Victims include embassies, ministries of foreign affairs, and diplomats from countries in the Middle East and Central Asia. The number of supported commands has increased over time, with the latest version of the backdoor having more than thirty. The operators retrieve these files on the machine using the DOWNLOAD_LIST command. Another custom backdoor, which is executed using the command “CMD_EXECUTE:”””

Source: https://www.bleepingcomputer.com/news/security/zebrocy-operators-also-look-for-browser-and-email-databases/

Related posts
Cyber Security

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

Cyber Security

Art of Twitter account hacking

Cyber Security

Alexa Eavesdropping Flub Re-Sparks Voice Assistant Privacy Debate

Cyber Security

Dan Geer, Richard Thieme on specialization in security