Thread Rating:

EvenBob
EvenBob
  • Threads: 443
  • Posts: 30203
Joined: Jul 18, 2010
March 16th, 2025 at 1:53:51 PM permalink
Quote: Tanko



New coins are dropping every day

https://coinmarketcap.com/new/
link to original post



There are 500 different cryptocurrencies on that list and that's not all of them. But it's not a scam, it's not a commodity, it's not a collectible, it's not a Ponzi scheme, they're all legitimate currencies. What a joke. Every single one of them is just a way for some people to get rich and other people to get poorer.
"It's not called gambling if the math is on your side."
rxwine
rxwine
  • Threads: 223
  • Posts: 12964
Joined: Feb 28, 2010
March 18th, 2025 at 7:41:41 PM permalink
Quote:

Microsoft Incident Response has identified a new remote access trojan (RAT) that is capable of stealing a wide variety of information from your computer from passwords and cryptocurrency wallet information to operating system details, device identifiers, and even camera presence data.

The most sophisticated – and perhaps the most alarming – feature of this new malware is its ability to use watchdog threads to ensure self-reinstatement if removed. Basically, it can reinstall itself.

As reported by BleepingComptuer, the StilachiRAT is used to steal digital wallet data from multiple cryptocurrency wallets including Coinbase Wallet, Phantom, Trust Wallet, Metamask, OKX Wallet, Bitget Wallet and up to 20 others.

The malware also has sophisticated reconnaissance abilities and is able to steal information from an infected PC including credentials stored in your browser, clipboard data, system information, hardware identifiers, camera presence, active Remote Desktop Protocol (RDP) sessions, and running GUI-based applications.

StilachiRAT can extract credentials from Google Chrome's local state file using Windows APIs, monitor clipboard activity for password information and crypto keys and track active windows or applications. It uses the Windows service control manager (SCM) to maintain persistence and reinstalls it automatically when the malware notices its binaries are no longer active.

t the same time, StilachiRAT can monitor active RDP sessions by impersonating logged in users. It does this by capturing information from foreground windows then cloning security tokens. This allows attackers to move laterally through a victim’s network after the malware has been deployed on RDP servers that usually host admin sessions.

StilachiRAT can also evade detection and has anti-forensics features, such as the ability to clear event logs and check for signs that its running in a sandbox in order to block malware analysis attempts. If its tricked into running in a sandbox, the RAT’s API calls are encoded to slow down further analysis.

Sanitized for Your Protection
AutomaticMonkey
AutomaticMonkey
  • Threads: 9
  • Posts: 390
Joined: Sep 30, 2024
March 18th, 2025 at 7:50:03 PM permalink
Quote: rxwine

Quote:

Microsoft Incident Response has identified a new remote access trojan (RAT) that is capable of stealing a wide variety of information from your computer from passwords and cryptocurrency wallet information to operating system details, device identifiers, and even camera presence data.

The most sophisticated – and perhaps the most alarming – feature of this new malware is its ability to use watchdog threads to ensure self-reinstatement if removed. Basically, it can reinstall itself.

As reported by BleepingComptuer, the StilachiRAT is used to steal digital wallet data from multiple cryptocurrency wallets including Coinbase Wallet, Phantom, Trust Wallet, Metamask, OKX Wallet, Bitget Wallet and up to 20 others.

The malware also has sophisticated reconnaissance abilities and is able to steal information from an infected PC including credentials stored in your browser, clipboard data, system information, hardware identifiers, camera presence, active Remote Desktop Protocol (RDP) sessions, and running GUI-based applications.

StilachiRAT can extract credentials from Google Chrome's local state file using Windows APIs, monitor clipboard activity for password information and crypto keys and track active windows or applications. It uses the Windows service control manager (SCM) to maintain persistence and reinstalls it automatically when the malware notices its binaries are no longer active.

t the same time, StilachiRAT can monitor active RDP sessions by impersonating logged in users. It does this by capturing information from foreground windows then cloning security tokens. This allows attackers to move laterally through a victim’s network after the malware has been deployed on RDP servers that usually host admin sessions.

StilachiRAT can also evade detection and has anti-forensics features, such as the ability to clear event logs and check for signs that its running in a sandbox in order to block malware analysis attempts. If its tricked into running in a sandbox, the RAT’s API calls are encoded to slow down further analysis.


link to original post



Microsoft? Windows? Google? Chrome?

I'm sorry, these are unfamiliar terms in my digital life. Literally nothing runs on my machines until I type "sudo" and a really long password.
DRich
DRich
  • Threads: 91
  • Posts: 13379
Joined: Jul 6, 2012
March 19th, 2025 at 5:13:51 AM permalink
Quote: AutomaticMonkey



Microsoft? Windows? Google? Chrome?

I'm sorry, these are unfamiliar terms in my digital life. Literally nothing runs on my machines until I type "sudo" and a really long password.
link to original post



What is "sudo"? I am not familiar with that.
You can't know everything, but you can know anything.
Dieter
Administrator
Dieter
  • Threads: 16
  • Posts: 6465
Joined: Jul 23, 2014
March 19th, 2025 at 6:23:26 AM permalink
Quote: DRich

Quote: AutomaticMonkey



Microsoft? Windows? Google? Chrome?

I'm sorry, these are unfamiliar terms in my digital life. Literally nothing runs on my machines until I type "sudo" and a really long password.
link to original post



What is "sudo"? I am not familiar with that.
link to original post



sudo is like su. The difference is that sudo executes a specified command ("sudo vi /etc/passwd" maybe), where su opens a shell.
May the cards fall in your favor.
OnceDear
OnceDear
  • Threads: 64
  • Posts: 7552
Joined: Jun 1, 2014
March 19th, 2025 at 6:29:18 AM permalink
Quote: DRich



What is "sudo"? I am not familiar with that.
link to original post



It's super user do in Linux command line
Psalm 25:16 Turn to me and be gracious to me, for I am lonely and afflicted. Proverbs 18:2 A fool finds no satisfaction in trying to understand, for he would rather express his own opinion.
DRich
DRich
  • Threads: 91
  • Posts: 13379
Joined: Jul 6, 2012
March 19th, 2025 at 8:37:05 AM permalink
Quote: Dieter

Quote: DRich

Quote: AutomaticMonkey



Microsoft? Windows? Google? Chrome?

I'm sorry, these are unfamiliar terms in my digital life. Literally nothing runs on my machines until I type "sudo" and a really long password.
link to original post



What is "sudo"? I am not familiar with that.
link to original post



sudo is like su. The difference is that sudo executes a specified command ("sudo vi /etc/passwd" maybe), where su opens a shell.
link to original post



Thank you, I assumed it was an application he was running.
You can't know everything, but you can know anything.
billryan
billryan
  • Threads: 268
  • Posts: 18066
Joined: Nov 2, 2009
March 21st, 2025 at 11:11:03 AM permalink
The CEO and Founder of cryptocurrency market maker Gotbit pleaded guilty to financial misappropriation and market manipulation. He performed " wash sales" to give the impression of a much higher volume. Thinly traded securities can be difficult to unload in a timely fashion, so they tend to sell at a discount. The opposite is true for heavily traded ones.
He is the third " market maker" arrested this year.
The older I get, the better I recall things that never happened
  • Jump to: