Site icon Tech Newsday

Raccoon Stealer Returns With New Version That Targets Users’ Passwords

The Raccoon Stealer malware returns with a new version that attackers can access on cybercrime forums. According to security analysts from Sekoia, Raccoon 2.0 was built from scratch with C/C++. It has a new back-end, front-end, and code to steal credentials and other data.

The malware is only available to a limited number of hackers, mainly former users, at a cost of $275/month or $125/week.

The researchers found that the new Racoon Stealer can work on 32 and 64-bit systems without any dependencies and fetches only eight legitimate DLLs from its C2 servers.

The C2 server provides the malware with its configurations, including targeted apps, URLs hosting the DLLs, and tokens for data exfiltration. The C2 server also receives machine fingerprint data and then waits for individual POST requests containing stolen information.

Data stolen by Raccoon Stealer 2.0 include: basic system fingerprint information; browser passwords, cookies, autofill data, and stored credit cards; wallets for cryptocurrencies and browser extensions; individual files on all hard drives; screenshot capture; and installed application list.

“We expect a resurgence of Raccoon Stealer v2, as developers implemented a version tailored to the needs of cybercriminals (efficiency, performance, stealing capabilities, etc.) and scaled their backbone servers to handle large loads,” Sekoia comments in the report.

The sources for this piece include an article in BleepingComputer.

Exit mobile version