February 26, 2020 at 6:30 pm UTC · 2 min read
It seems that cryptocurrency owners have another threat to keep on their radars besides scammers and cryptojacking. It’s called Raccoon malware and it’s even peskier than the brown-and-white critters causing havoc in your backyard.
A new threat on the horizon – Raccoon malware
According to tech news site ZDNet, Raccoon is growing in popularity among cybercriminals for its wide-reaching capabilities. It isn’t the cheapest option available to opportune hackers but it gives them the ability to target as many as 60 applications–including a massive range of browsers:
“Every browser you can think of is a target of the popular malware.”
The Raccoon “infostealer” is particularly adept at stealing data from infected devices. It has gained traction thanks to a following in underground communities where it has been extensively marketed for its easy-to-use backend and wide range of capabilities.
Raccoon malware goes for $200 a month, but it can reap a far greater return for its purchasers. It’s also incredibly sophisticated as far as malware is concerned, offering a subscription model with tech support, updates, and bug fixes. This makes it a “worthwhile investment” for bad actors of all stripes.
Cybersecurity analysts Cyberark noted that unlike most run-of-the-mill info stealers, Raccoon malware uses a variety of techniques to steal information. Its C++ malware can swipe data from at least 35 different browsers.
Raccoon is generally delivered to its victims through phishing campaigns and fraudulent emails with MS Office documents attached containing the malicious code. It can also spread to your machine through what is known as “exploit kits.” This is where you are profiled for any browser-based vulnerabilities and redirected to a site where the exploit kit is lying in wait.