![]() The emails contain a keylogger that sends information back to the cybercriminal via email, FTP, or Web panel (PHP): system information, keystrokes, browser-cached account credentials, and screenshots. The common attack scenarios by cybercriminals using these toolkits involve sending out business-themed messages to publicly listed email addresses-methods that are very similar or related to what is known as a Business Email Compromise (BEC) scheme. Our researchers studied these keyloggers for only a few months, but have found a number of noteworthy features. These remote access tools (RATs) possess similar functions: standard keylogging behaviors with several data-exfiltration methods. This Trend Micro research paper reveals the operations behind Predator Pain and Limitless keyloggers, both of which are easily obtainable from underground forums. View research paper: Predator Pain and Limitless
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |