Happy Monday everyone!

The AhnLab, Inc. Security Intelligence Center (ASEC) has been monitoring infostealer malware that is disguised as illegal software and keygens and found that most of the malware that is distributed in this manner has been the #LummaC2 infostealer BUT there has been an increase in distribution of the #ACRStealer as well. What is pretty interesting is the technique they use for C2. In this case they have used Steam, telegra.ph, Google Docs (Form) and Google Docs (Presentation). Enjoy and Happy Hunting!

ACRStealer Infostealer Exploiting Google Docs as C2
https://asec.ahnlab.com/en/86390/

Intel 471 Cyborg Security, Now Part of Intel 471 #ThreatIntel #ThreatHunting #ThreatDetection #HappyHunting #readoftheday

ACRStealer Infostealer Exploiting Google Docs as C2 - ASEC

AhnLab SEcurity intelligence Center (ASEC) monitors the Infostealer malware disguised as illegal programs such as cracks and keygens being distributed, and publishes related trends and changes through the Ahnlab TIP and ASEC Blog posts. While the majority of the malware distributed in this manner has been the LummaC2 Infostealer, the ACRStealer Infostealer has seen an […]

ASEC

🚨 New malware alert! #ACRStealer is using Google Docs and Steam to steal credentials, crypto wallets & more. Spread via software cracks! 🔒⚠️

Read: https://hackread.com/hackers-google-docs-steam-drop-acrstealer-infostealer/

#CyberSecurity #Malware #InfoStealer #GoogleDocs #Steam

Hackers Use Google Docs and Steam to Spread ACRStealer Infostealer

Follow us on Bluesky, Twitter (X) and Facebook at @Hackread

Hackread - Latest Cybersecurity, Tech, AI, Crypto & Hacking News