What's Hot

    From Chaos to Clarity: How Gusto Became My Small Business’s Secret Weapon for Stress-Free HR Operations

    Why 300,000+ Businesses Trust Gusto: A Deep Dive into the All-in-One Platform Transforming Workforce Management

    Why INE Became My Go-To Platform for Mastering In-Demand Tech Skills

    TechBata.comTechBata.com
    • Home
    • Artificial Intelligence
    • Mobile
    • Cyber Security
    • Tech
    • News
    TechBata.comTechBata.com
    Home»Tech»Harmful new malware targets dozens of browsers, password managers, and crypto wallets
    Tech

    Harmful new malware targets dozens of browsers, password managers, and crypto wallets

    adminBy admin

    Uptycs says that the administrator of The Meduza Stealer has been selling the brand new malware by displaying that it might efficiently evade detection by respected antivirus software program. Screenshots present Bitdefender, AVG, Kaspersky, McAfee, and Malwarebytes all failing to detect the malware in static and dynamic scans of the Meduza stealer file:

    Static antivirus scan report of Meduza stealer file. Picture supply: Uptycs

    Right here’s how the malware really works as soon as it infiltrates your laptop:

    Step one it performs is a geolocation test. If the sufferer’s location is within the stealer’s predefined record of excluded nations, the malware operation is straight away aborted. Nonetheless, if the placement isn’t on the record, Meduza Stealer checks if the attacker’s server is energetic. In case the server isn’t accessible, the stealer additionally promptly terminates its exercise. If each situations—location test and server accessibility—are favorable, the stealer proceeds to assemble in depth data. This consists of gathering system data, browser knowledge, password supervisor particulars, mining-related registry data, and particulars about put in video games. As soon as this complete set of knowledge is gathered, it’s packaged and uploaded, able to be dispatched to the attacker’s server, thereby finishing the stealer’s operation throughout the contaminated machine.

    As famous above, the malware targets a number of delicate apps, together with browsers and password managers. The record of browsers The Meduza Stealer assaults embody a number of variations of Chrome, Edge, Firefox, Opera, Courageous, and dozens extra I’ve by no means even heard of.

    Different famous targets embody the Steam software program consumer, Discord, password managers, two-factor authentication apps, and cryptocurrency pockets extensions.

    Related Posts

    Twitter engaged on video calling options like FaceTime – however why?

    September 15, 2023

    Easy methods to be a part of the Threads beta program and get new options early

    September 12, 2023

    Rumored iPhone 16 Professional solid-state buttons probably scrapped for good

    September 11, 2023

    Deadpool 3 leak reveals a loopy cameo we by no means anticipated from Fox’s Marvel films

    September 8, 2023

    LG Show may even manufacture OLED panels for brand spanking new MacBook Professional

    September 4, 2023

    One different new report says iPhone 15 Skilled Max is getting an unlimited worth hike

    August 12, 2023
    Add A Comment

    Comments are closed.

    Our Picks

    One different new report says iPhone 15 Skilled Max is getting an unlimited worth hike

    How NiceJob Transformed My Local Business—And Why It’s a Must-Have for Every Entrepreneur

    Understanding Cyberattack- Prime Helpful Cyber Safety Hacks to Attempt

    Salesforce launches AI Cloud with raft of generative AI instruments

    Community Discovery: The right way to Shield Your Community?

    AMD Brings AI to x86 with its Ryzen Professional 7000 Collection Processors

    Why Tenable Nessus® is the Ultimate Cybersecurity Game-Changer (And Why You Need It)

    How one can Safe Consumer Knowledge from Theft

    Categories
    • Artificial Intelligence
    • Cyber Security
    • Mobile
    • News
    • Reviews
    • Tech
    About
    • Privacy Policy
    • About Us
    • Contact US

    Our website is a go-to destination for tech enthusiasts. As a technology blog, we provide a wealth of knowledge on various topics including Artificial Intelligence, Mobile technology, Cyber Security, and the latest Tech News.

    © 2025 Designed by Techbata.com.

    Type above and press Enter to search. Press Esc to cancel.