New Malware Campaign Distributes Lumma and ACR Stealer via Cracked Software

Published:

spot_img

Rising Threat of Information Stealers: New Malware Campaigns Exploit Cracked Software and MSC Files

Cybersecurity Alert: Surge in Malware Campaigns Targeting Software Users

Feb 24, 2025 – By Ravie Lakshmanan

In an alarming trend, cybersecurity experts are raising red flags over a new malware campaign that preys on users seeking cracked software versions, subsequently delivering information-stealing trojans such as Lumma and ACR Stealer. The AhnLab Security Intelligence Center (ASEC) has reported a significant uptick in ACR Stealer incidents since January 2025, with hackers employing advanced techniques to outsmart defenses.

ACR Stealer utilizes a method known as “dead drop resolver,” extracting command-and-control (C2) server addresses via legitimate platforms like Steam and Google Forms. “Threat actors encode the C2 domain in Base64 on a specific web page,” ASEC revealed. “The malware decodes this to execute malicious actions,” heightening the challenge for security protocols.

The malware has evolved from earlier distributions via Hijack Loader, now capable of siphoning vast amounts of sensitive information, including browser data and cryptocurrency wallets. ASEC also highlighted another disturbing development: the emergence of files with an "MSC" extension, designed to exploit vulnerabilities in Microsoft’s Management Console, unleashing the Rhadamanthys stealer upon execution.

This threat landscape is compounded by a recent Hudson Rock report indicating that over 30 million systems have fallen victim to such stealers in recent years, resulting in the theft of vital corporate credentials. With cybercriminals offering stolen access for a mere $10, the implications for sensitive sectors are grave, especially within defense and military domains.

As malware tactics continue to diversify, experts urge organizations to enhance their cybersecurity measures. The rise in these sophisticated threats underscores a vital need for vigilance in digital environments, where compromised credentials can lead to catastrophic breaches.

spot_img

Related articles

Recent articles

Crocodilus Android Trojan Targets Banks and Crypto Wallets in 8 Countries

Rising Threats: The Crocodilus Android Banking Trojan Introduction to Crocodilus A newly identified Android banking trojan, dubbed Crocodilus, is making waves among cybersecurity experts as it...

Sharjah Chamber to Celebrate Excellence Award Winners on June 25

Sharjah Excellence Award 2024: Ceremony Date and Upcoming Developments Upcoming Closing Ceremony The Sharjah Excellence Award (SEA) is set to host its closing ceremony, recognizing the...

Uncovering Malicious Packages: The Ongoing Threat to Open-Source Supply Chains

Rising Threats in Open-Source Ecosystems: An Insight into Malicious Packages In recent weeks, significant concerns have emerged regarding the integrity of open-source ecosystems, particularly within...

Inside the Dark Web: Infiltrating Ransomware Gangs

Understanding the Ransomware Crisis: Insights from 60 Minutes In a recent segment of 60 Minutes, correspondent Bill Whitaker delved into the escalating threat of ransomware...