Luca Stealer Malware published on GitHub

New Luca Stealer Malware with a focus on Chromium-based web browsers is circulating through the web – user manual included.

After the source code of Luca Stealer Malware has appeared on GitHub, the malware is spreading at breakneck speed. The malware focuses on Chromium-based web browsers on Windows systems.

Malware with enormous potential for damage – And instructions for use

The first release of the malware programmed in Rust took place on July 3rd in a cybercrime forum. Since then, the developer has continuously developed the malware and in the meantime also made the source code available on GitHub. In order to make it easier for interested parties to use the malware, the developer also provides instructions for compiling the source code and possible extensions to the software.

According to Cyble’s security researchers, over 25 examples based on this source code have surfaced in the wild. Although Luca Stealer has only targeted Windows systems so far, the researchers believe that the developer could use Rust’s cross-platform functionality to target other platforms in the future.

Luca Stealer is after this data

Luca Stealer’s target are Chromium-based web browsers. In addition to Google Chrome, this also includes other common browsers such as Edge from Microsoft, Brave or Vivaldi. The malware steals user’s credit card details, cookies, browser extension data from password managers and cryptowallets, as well as login credentials, as well as local files. Gaming accounts, for example from Steam or Uplay, as well as common messenger services such as Discord, ICQ, Element and Skype are also on the malware menu.

Originally, Luca Stealer was supposed to use a Telegram Exfiltrate bot. However, the upload size limitation to 50 MB prompted the developer to implement an alternative data channel via Discord webhooks.

IT security starts with the user

No matter how secure a system may be, the biggest security gap is usually the user. In order to protect yourself from malware like Luca Stealer, it is therefore important to first develop a feeling for how to behave correctly on the Internet in order not to offer attackers a target.

This includes that Don’t even download files from untrustworthy sources or click on links that don’t appear to be trustworthy. It doesn’t matter whether it’s a website or a message that you didn’t expect to receive. Because behind every unknown link there is potentially malware like Luca Stealer.

It is also important to keep the software used up to date. This ensures that most of the already known and exploited vulnerabilities are already closed. Anti-virus and other security software in particular can only provide a useful service if it is always up to date. This is the only way current security risks can be identified and reliably reported to the user.

And last but not least, there is the tedious issue of passwords. That passwords should be long, varied and unique is certainly nothing new. Every website, software and user account always deserves its own password. This should be changed periodically and stored in a safe location. Because if you use the same password everywhere, you may get a lot of work if malware like Luca Stealer strikes.

Tarnkappe.info

Related Articles

Back to top button