Monday, March 20, 2023
  • Advertise With Us
  • Write For Us
  • Contact Us
  • About Us
  • Editorial Calendar
Download Latest Issue - Free!
The Cyber Express
World Cybercon Middle East
  • MagazineDownload
  • Firewall Daily
    • All
    • Dark Web News
    • Data Breach News
    • Hacking News
    • Ransomware News
    • Vulnerabilities
    US cyber attacks 2023: Cybercrime has caused an estimated $6 trillion in damages in 2022 alone

    US cyber attacks 2023: Cybercrime has caused an estimated $6 trillion in damages in 2022 alone

    Anonymous Sudan Claims to Sell Stolen Data from the Air France Cyber attack for $3,000

    Anonymous Sudan Claims to Sell Stolen Data from the Air France Cyber attack for $3,000

    Tri Counties Bank cyber attack

    Tri Counties Bank Cyber Attack: Customers Data At Risk After BlackBasta Ransomware Group Lists It Among Victims

    Microsoft Outlook Vulnerability

    Microsoft Outlook Zero Day Vulnerability Actively Exploited

    GISEC Global 2023

    GISEC Global 2023: H.E. Dr Mohamed Hamad Al-Kuwaiti Recognized for Outstanding Contributions in Advancing Global Cybersecurity

    Gamekaking Data Breach

    Gamekaking Data Breach? Leakbase Claims to Upload 19 Million Rows of Stolen Information

    Medusa Ransomware Group

    Medusa Ransomware Group Targets National Institute of Ocean Technology

    BreachForums

    FBI Arrests BreachForums Operator ‘Pompompurin’, Slaps Cybercrime Charges

    Clop Ransomware Group Adds Hitachi Energy

    Hitachi Energy Confirms Security Incident After Clop Ransomware Adds it to Victim List

  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    BreachForums

    FBI Arrests BreachForums Operator ‘Pompompurin’, Slaps Cybercrime Charges

    Cybersecurity Excellence Awards

    Cybersecurity Excellence Awards: Cyble Rated Fastest Growing Cybersecurity Company

    Insider threat mitigation

    Behavioral Psychology, a Boon for Insider Risk Mitigation

    Safer Internet

    International Safer Internet Day: How Safe Are Our Teenagers Online?

    TRAI

    TRAI Asked to Involve MoD in Drafting Big Data Regulations & Policies

    cybersecurity

    Cybersecurity incidents may soon be ‘uninsurable’

    Australia

    Australia Ropes in Tech Veterans to Set Up Cyber Action Plan

    Active Directory

    Prevent Ransomware: Save the Active Directory

    Privacy Penalty Bill

    Privacy Penalty Bill: Australian Parliament Approves Heavy Fines

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business News
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    GISEC Global 2023

    GISEC Global 2023: H.E. Dr Mohamed Hamad Al-Kuwaiti Recognized for Outstanding Contributions in Advancing Global Cybersecurity

    GISEC Global 2023

    GISEC Global 2023: Knowledge Sharing, Collaboration Vital to Fend off Cyberattacks, say Experts

    Call & Contact Center Expo 2023 Las Vegas

    Call & Contact Center Expo 2023 Las Vegas

    Former BookMyShow CTO Mahesh Vandi Chalil

    Cyble Appoints Former BookMyShow CTO Mahesh Vandi Chalil as Chief Product and Technology Officer

    GISEC 2023

    GISEC 2023: Microsoft Highlights Zero Trust Approach and Mixed Reality Policing Tools

    GISEC Global 2023

    GISEC Global 2023: ‘Take the Fight to Cyber Attackers’ Urges UAE Cybersecurity Council Paper

    Cyble in Forbes List

    Cyble Recognized by Forbes as One of America’s Best Startup Employers 2023

    Cybersecurity Excellence Awards

    Cybersecurity Excellence Awards: Cyble Rated Fastest Growing Cybersecurity Company

    Cyble Among Top 50 Emerging Companies

    Cyble Among Top 50 Emerging Companies Across Governance Risk & Compliance Solutions Sector

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • EventsCyberCon
    •  Cyber Security Webinar
    • World CyberCon Middle East 2023
    • Endorsed Events
No Result
View All Result
The Cyber Express
  • MagazineDownload
  • Firewall Daily
    • All
    • Dark Web News
    • Data Breach News
    • Hacking News
    • Ransomware News
    • Vulnerabilities
    US cyber attacks 2023: Cybercrime has caused an estimated $6 trillion in damages in 2022 alone

    US cyber attacks 2023: Cybercrime has caused an estimated $6 trillion in damages in 2022 alone

    Anonymous Sudan Claims to Sell Stolen Data from the Air France Cyber attack for $3,000

    Anonymous Sudan Claims to Sell Stolen Data from the Air France Cyber attack for $3,000

    Tri Counties Bank cyber attack

    Tri Counties Bank Cyber Attack: Customers Data At Risk After BlackBasta Ransomware Group Lists It Among Victims

    Microsoft Outlook Vulnerability

    Microsoft Outlook Zero Day Vulnerability Actively Exploited

    GISEC Global 2023

    GISEC Global 2023: H.E. Dr Mohamed Hamad Al-Kuwaiti Recognized for Outstanding Contributions in Advancing Global Cybersecurity

    Gamekaking Data Breach

    Gamekaking Data Breach? Leakbase Claims to Upload 19 Million Rows of Stolen Information

    Medusa Ransomware Group

    Medusa Ransomware Group Targets National Institute of Ocean Technology

    BreachForums

    FBI Arrests BreachForums Operator ‘Pompompurin’, Slaps Cybercrime Charges

    Clop Ransomware Group Adds Hitachi Energy

    Hitachi Energy Confirms Security Incident After Clop Ransomware Adds it to Victim List

  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    BreachForums

    FBI Arrests BreachForums Operator ‘Pompompurin’, Slaps Cybercrime Charges

    Cybersecurity Excellence Awards

    Cybersecurity Excellence Awards: Cyble Rated Fastest Growing Cybersecurity Company

    Insider threat mitigation

    Behavioral Psychology, a Boon for Insider Risk Mitigation

    Safer Internet

    International Safer Internet Day: How Safe Are Our Teenagers Online?

    TRAI

    TRAI Asked to Involve MoD in Drafting Big Data Regulations & Policies

    cybersecurity

    Cybersecurity incidents may soon be ‘uninsurable’

    Australia

    Australia Ropes in Tech Veterans to Set Up Cyber Action Plan

    Active Directory

    Prevent Ransomware: Save the Active Directory

    Privacy Penalty Bill

    Privacy Penalty Bill: Australian Parliament Approves Heavy Fines

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business News
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    GISEC Global 2023

    GISEC Global 2023: H.E. Dr Mohamed Hamad Al-Kuwaiti Recognized for Outstanding Contributions in Advancing Global Cybersecurity

    GISEC Global 2023

    GISEC Global 2023: Knowledge Sharing, Collaboration Vital to Fend off Cyberattacks, say Experts

    Call & Contact Center Expo 2023 Las Vegas

    Call & Contact Center Expo 2023 Las Vegas

    Former BookMyShow CTO Mahesh Vandi Chalil

    Cyble Appoints Former BookMyShow CTO Mahesh Vandi Chalil as Chief Product and Technology Officer

    GISEC 2023

    GISEC 2023: Microsoft Highlights Zero Trust Approach and Mixed Reality Policing Tools

    GISEC Global 2023

    GISEC Global 2023: ‘Take the Fight to Cyber Attackers’ Urges UAE Cybersecurity Council Paper

    Cyble in Forbes List

    Cyble Recognized by Forbes as One of America’s Best Startup Employers 2023

    Cybersecurity Excellence Awards

    Cybersecurity Excellence Awards: Cyble Rated Fastest Growing Cybersecurity Company

    Cyble Among Top 50 Emerging Companies

    Cyble Among Top 50 Emerging Companies Across Governance Risk & Compliance Solutions Sector

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • EventsCyberCon
    •  Cyber Security Webinar
    • World CyberCon Middle East 2023
    • Endorsed Events
No Result
View All Result
The Cyber Express
No Result
View All Result
Home Firewall Daily Dark Web News

VectorStealer, Unlocking Doors to RDP Hijacking

The stealer payload can be generated through the web panel, which allows the attacker to create custom malware without having advanced programming skills.

Ashish Khaitan by Ashish Khaitan
February 2, 2023
in Dark Web News, Firewall Daily
0
VectorStealer
610
SHARES
3.4k
VIEWS
Share on LinkedInShare on Twitter

An information stealer malware dubbed “VectorStealer”, which possesses the ability to pilfer precious .rdp files, was detected by Cyble researchers.  

Cybercriminals often use information stealers to commit identity theft and financial fraud. The act of stealing allows malicious individuals to perform RDP hijackings, as the stolen files contain the key to accessing RDP sessions, including all crucial information necessary for remote control. 

You might also like

BreachForums Down After Promoter’s Arrest, Migration Underway Says New Admin

Stormous Demands 7 BTC for Stolen Data After the Alleged Fichtner Ransomware Attack

US cyber attacks 2023: Cybercrime has caused an estimated $6 trillion in damages in 2022 alone

Information stealers are widely used to steal sensitive information from computers and other devices. They can capture and exfiltrate sensitive data such as passwords, credit card numbers, banking information, and other confidential information without the user’s knowledge or consent. 

VectorStealer: a new information stealer on the market 

VectorStealer surfaced on cybercrime forums in the latter half of 2022. The threat actor (TA) behind this stealer primarily operates through a web panel and a Telegram channel. 

According to the report, the VectorStealer has the capability to recover sensitive information from all major browsers, including Firefox, Chrome, and Safari.  

The stealer is also capable of stealing Discord tokens and sensitive files, as well as gathering basic information about the infected computer. The payload of the stealer is being sold for 63 USD in Bitcoin. 

The stealer payload can be generated through the web panel, which allows the attacker to create custom malware without having advanced programming skills. The web panel has a user-friendly interface and provides various options for customization, such as specifying the actions the malware will perform and configuring the behavior of the malware. 

The sensitive information stolen from the victim’s system can be exfiltrated using SMTP, Discord, and Telegram. Interestingly, on the same web panel, the TA advertises KGB Crypter and claims that this crypter can kill multiple antivirus solutions.  

Crypters are tools used by threat actors to evade detection by encrypting the malware code, making it difficult for antivirus software to identify and remove it. 

The threat actors behind KGB Crypter provide the service through their website and claim that it is compatible with .Net and C++-based binaries. They also claim that multiple prominent malware families, such as Redline, Quasar RAT, Venom RAT, and Pandora RAT, are already using this crypter.  

The creators of KGB Crypter are of Russian origin and boast that over 1,000 users have registered on their site, indicating its popularity among TAs.  

The crypter is offered as a paid service for 145 USD per month and is equipped with a metamorphic generator, which alters the code each time it is compiled, making it more challenging for antivirus software to detect. 

VectorStealer and KGB Crypter pose a significant threat to online security and sensitive information. Individuals and organizations must take precautions to protect their systems and sensitive data, such as keeping the software and security tools up-to-date, avoiding suspicious emails and links, and only downloading apps from reputable sources. 

VectorStealer: How do Information stealers work? 

Information stealers like VectorStealer typically work by infiltrating a device, such as a computer or mobile device, and then actively monitoring the system for sensitive information. They may use various techniques to achieve this, such as keylogging, screen capture, or data scraping.  

Once the information stealer has obtained the desired data, it can exfiltrate it to a remote server controlled by the attacker, where it can be used for malicious purposes, such as identity theft or financial fraud.  

Information stealers can be delivered to a device through various methods, including email attachments, malicious websites, and software downloads. They can also be hidden within legitimate software or disguised as harmless apps or programs.  

While there is no single fix for protecting oneself from information stealers, the rule of thumb says that one practice safe computing habits, such as keeping the software and security tools up-to-date, avoiding suspicious emails and links, and only downloading apps from reputable sources to reduce the risk of falling victim to an information stealer. 

What is RDP hacking? 

RDP hacking refers to unauthorized access to a remote desktop protocol (RDP) server, often accomplished through stolen login credentials or exploiting vulnerabilities in the RDP configuration.  

This hacking allows an attacker to control a victim’s computer or network remotely, potentially accessing sensitive information, installing malware, or using the compromised system for other malicious purposes.  

RDP hacking can have severe consequences for individuals and organizations, and it is essential to secure RDP connections to prevent such attacks. 

There are several ways hackers attack RDPs, some of them using brute force attacks, exploiting unsecured RDP connections, injecting malicious RDP software, and man-in-the-middle attacks are still prevalent while attacking an RDP ecosystem.  

These are just a few examples of the many ways RDP systems can be hacked, highlighting the importance of secure RDP configurations and practices to prevent such attacks. 

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • More
  • Click to email a link to a friend (Opens in new window)
  • Click to share on WhatsApp (Opens in new window)

Related

Tags: VectorStealer
Previous Post

Spammers Deploy Information Stealing Qakbot Malware in OneNote Attachment

Next Post

Guardian Analytics Data Leak: Ransomware Groups Daixin Team and Lockbit List Firm as Victim

Ashish Khaitan

Ashish Khaitan

Ashish is a technical writer at The Cyber Express. He adores writing about the latest technologies and covering the latest cybersecurity events. In his free time, he likes to play horror and open-world video games.

Related Posts

BreachForums
Cybersecurity News

BreachForums Down After Promoter’s Arrest, Migration Underway Says New Admin

by Chandu Gopalakrishnan
March 20, 2023
fichtner ransomware attack
Data Breach News

Stormous Demands 7 BTC for Stolen Data After the Alleged Fichtner Ransomware Attack

by Editorial
March 20, 2023
US cyber attacks 2023: Cybercrime has caused an estimated $6 trillion in damages in 2022 alone
Data Breach News

US cyber attacks 2023: Cybercrime has caused an estimated $6 trillion in damages in 2022 alone

by Ashish Khaitan
March 20, 2023
Anonymous Sudan Claims to Sell Stolen Data from the Air France Cyber attack for $3,000
Data Breach News

Anonymous Sudan Claims to Sell Stolen Data from the Air France Cyber attack for $3,000

by Editorial
March 20, 2023
Tri Counties Bank cyber attack
Firewall Daily

Tri Counties Bank Cyber Attack: Customers Data At Risk After BlackBasta Ransomware Group Lists It Among Victims

by Ashish Khaitan
March 20, 2023
Next Post
Guardian Analytics Data Leak

Guardian Analytics Data Leak: Ransomware Groups Daixin Team and Lockbit List Firm as Victim

Latest Issue is Out. Subscribe Now

Women in Cybersecurity

Download Now

CRIL


Follow Us On Google News

Never miss an update. Subscribe!

* indicates required

Top 10 Cybersecurity Jobs

Categories

About The Cyber Express

The Cyber Express

Cyber Security News and Magazine

The Cyber Express is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats.

Follow The Cyber Express

Contact

For editorial queries: [email protected]

For marketing, PR & media partnerships: [email protected]

For media kit and digitals sales: [email protected]

For Sponsorship/Event Partnership: [email protected]

For Conferences related information: [email protected]

Our Address

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
555 North Point Center E
Alpharetta, GA 30022, USA.

Tel: (678) 578-8838

Events: +1 (678) 578-4140

 

India Office:

Cyber Express Media Network
HD-021, 4th Floor, C Wing, Building No.4. Nesco IT Park, WE Highway, Goregaon East, Mumbai, Maharashtra, India – 4000063

Tel: (678) 578-8838

Events: +1 (678) 578-4140

Subscribe to Our Feed

RSS Feeds

Follow Us On Google News

© 2022 The Cyber Express (Cyber Security News and Magazine) | By Cyble Inc.

No Result
View All Result
  • Firewall Daily
  • Business News
  • Cyber Essentials
  • Features
  • Cyber Security Magazine
  • Events
    • World CyberCon Middle East 2023
    •  Cyber Security Webinar

© 2022 The Cyber Express (Cyber Security News and Magazine) | By Cyble Inc.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.