SnakeStealer: How it preys on personal data – and how you can protect yourself
ATT&CK techniques detected
T1555.003Credentials from Web Browsers
97%
“passwords from web browsers, databases, email and chat clients, including discord, and wi - fi networks. - surveillance : it captures clipboard data, takes screenshots and logs keystrokes. - exfiltration : it sends stolen data via ftp, http, email, or telegram bots. how to protec…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1588.001Malware
92%
“snakestealer : how it preys on personal data – and how you can protect yourself infostealers remain one of the most persistent threats on today ’ s threat landscape. they ’ re built to quietly siphon off valuable information, typically login credentials and financial and cryptocu…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1102Web Service
56%
“discord to host its payloads, which victims unwittingly downloaded after opening a malicious email attachment. while hosting malware on legitimate cloud platforms wasn ’ t new, the widespread abuse of discord soon became a hallmark tactic. snakestealer reached its first big wave …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
Here’s what to know about the malware with an insatiable appetite for valuable data, so much so that it tops this year's infostealer detection charts