Life on a crooked RedLine: Analyzing the infamous infostealer’s backendFollowing the takedown of RedLine Stealer by international authorities, ESET researchers are publicly releasing their research into the infostealer’s backend modules.#welivesecurity#EN#2024#analysis#RedLine#infostealer#backend·welivesecurity.com·Nov 11, 2024Life on a crooked RedLine: Analyzing the infamous infostealer’s backend
From Perfctl to InfoStealerFrom Perfctl to InfoStealer, Author: Xavier Mertens#sans#EN#2024#Perfctl#infostealer#analysis#linux·isc.sans.edu·Oct 9, 2024From Perfctl to InfoStealer
Malware: Cuckoo Behaves Like Cross Between Infostealer and SpywareKandji's threat research team has discovered a piece of malware that combines aspects of an infostealer and spyware. Here's how it works.#kandji#EN#2024#spyware#infostealer#cuckoo#analysis·blog.kandji.io·Apr 30, 2024Malware: Cuckoo Behaves Like Cross Between Infostealer and Spyware