At the point when the Firefox browser is in utilization, the malware assembles particular documents having different passwords and keys, for example, "key3.db" "key4.db", "logins.json", and "cookies.sqlite".
Other than this, the malware likewise takes a screenshot of the infected machine and scans for any records on the framework finishing off with .doc, .docx, .txt, .rtf, .xls, .xlsx, or .pdf for exfiltration.
Vega Stealer isn't the most complex malware in use today
http://www.ehackingnews.com/2018/05/new-malware-variant-designed-to-swindle.html
No comments:
Post a Comment