The malware is increasingly distributed through SEO-poisoned sites and legitimate web platforms.
Infostealer malware are increasingly distributed through SEO-poisoned sites and legitimate web platforms.
According to a recent analysis by AhnLab Security Intelligence Center, and reported by GB Hackers, infostealer malware is posing as cracked software and keygens, which are increasingly distributed through SEO-poisoned sites and legitimate web platforms.
The report notes a shift in dominant malware, with LummaC2's presence declining and more evasive variants like ACRStealer, StealC, and Rhadamanthy: in particular, a new ACRStealer variant uses advanced anti-analysis features such as NT function spoofing and cross-architecture evasion.
Attackers are also using unconventional delivery tactics, including fake installers and overlay windows that push phishing payloads. Some employ password-protected archives hidden in image files to bypass traditional detection.
Written by
Dan Raywood is a B2B journalist with 25 years of experience, including covering cybersecurity for the past 17 years. He has extensively covered topics from Advanced Persistent Threats and nation-state hackers to major data breaches and regulatory changes.
He has spoken at events including 44CON, Infosecurity Europe, RANT Forum, BSides Scotland, Steelcon and the National Cyber Security Show, and served as editor of SC Media UK, Infosecurity Magazine and IT Security Guru. He was also an analyst with 451 Research and a product marketing lead at Tenable.