Raccoon Stealer Returns With New Version That Targets Users’ Passwords

Share post:

The Raccoon Stealer malware returns with a new version that attackers can access on cybercrime forums. According to security analysts from Sekoia, Raccoon 2.0 was built from scratch with C/C++. It has a new back-end, front-end, and code to steal credentials and other data.

The malware is only available to a limited number of hackers, mainly former users, at a cost of $275/month or $125/week.

The researchers found that the new Racoon Stealer can work on 32 and 64-bit systems without any dependencies and fetches only eight legitimate DLLs from its C2 servers.

The C2 server provides the malware with its configurations, including targeted apps, URLs hosting the DLLs, and tokens for data exfiltration. The C2 server also receives machine fingerprint data and then waits for individual POST requests containing stolen information.

Data stolen by Raccoon Stealer 2.0 include: basic system fingerprint information; browser passwords, cookies, autofill data, and stored credit cards; wallets for cryptocurrencies and browser extensions; individual files on all hard drives; screenshot capture; and installed application list.

“We expect a resurgence of Raccoon Stealer v2, as developers implemented a version tailored to the needs of cybercriminals (efficiency, performance, stealing capabilities, etc.) and scaled their backbone servers to handle large loads,” Sekoia comments in the report.

The sources for this piece include an article in BleepingComputer.

Featured Tech Jobs

SUBSCRIBE NOW

Related articles

Cyber Security Today, March 27, 2024 – A botnet exploits old routers, a new malware loader discovered, and more warnings about downloading code from...

This episode reports on a new network of 40,000 infected small and home office routers and other devices that are part of a criminal botnet

Cyber Security Today, March 25, 2024 – A suspected China threat actor going after unpatched F5 and ScreenConnet installations

This episode reports on a new campaign stealing email passwords ,the latest data breaches

A hacker’s view of the civic infrastructure: Hashtag Trending, the Weekend Edition for March 23rd, 2024

What does the civic infrastructure look like through the eyes of a hacker? The legendary general Sun Tzu in the Art of War said that in order to defeat your enemy, you must first understand your enemy. How do you do this? He said, “to know your enemy, you must become your enemy.” If we

Cyber Security Today, Week in Review for week ending Friday, March 22, 2024

This episode features discussion on lessons learned from the ransomware attack on the British Library, advice for managing expectations of IT/security teams, why firms are leaving Google Firebase unprotecte

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways