Technology ❯ Cybersecurity ❯ Malware
Credential Theft Data Theft Lumma Stealer Operation Magnus RedLine Infostealer Minecraft Lumma Stealka Antivirus Software Threat Intelligence Data Collection Phishing Techniques Stealer Logs Stealerium macOS Noodlophile Shamos Data Collection Methods ModStealer Atomic Stealer (AMOS) FileFix MetaStealer Data Protection Rhadamanthys DigitStealer Steganography Command-and-Control (C2) ViperSoftX AMOS Minecraft Mods Redline and Meta
Researchers describe a campaign that uses trusted download sites and polished decoy pages to harvest browser data and drain wallet secrets.