What's Hot

    From Chaos to Clarity: How Gusto Became My Small Business’s Secret Weapon for Stress-Free HR Operations

    Why 300,000+ Businesses Trust Gusto: A Deep Dive into the All-in-One Platform Transforming Workforce Management

    Why INE Became My Go-To Platform for Mastering In-Demand Tech Skills

    TechBata.comTechBata.com
    • Home
    • Artificial Intelligence
    • Mobile
    • Cyber Security
    • Tech
    • News
    TechBata.comTechBata.com
    Home»Tech»Harmful new malware targets dozens of browsers, password managers, and crypto wallets
    Tech

    Harmful new malware targets dozens of browsers, password managers, and crypto wallets

    adminBy admin

    Uptycs says that the administrator of The Meduza Stealer has been selling the brand new malware by displaying that it might efficiently evade detection by respected antivirus software program. Screenshots present Bitdefender, AVG, Kaspersky, McAfee, and Malwarebytes all failing to detect the malware in static and dynamic scans of the Meduza stealer file:

    Static antivirus scan report of Meduza stealer file. Picture supply: Uptycs

    Right here’s how the malware really works as soon as it infiltrates your laptop:

    Step one it performs is a geolocation test. If the sufferer’s location is within the stealer’s predefined record of excluded nations, the malware operation is straight away aborted. Nonetheless, if the placement isn’t on the record, Meduza Stealer checks if the attacker’s server is energetic. In case the server isn’t accessible, the stealer additionally promptly terminates its exercise. If each situations—location test and server accessibility—are favorable, the stealer proceeds to assemble in depth data. This consists of gathering system data, browser knowledge, password supervisor particulars, mining-related registry data, and particulars about put in video games. As soon as this complete set of knowledge is gathered, it’s packaged and uploaded, able to be dispatched to the attacker’s server, thereby finishing the stealer’s operation throughout the contaminated machine.

    As famous above, the malware targets a number of delicate apps, together with browsers and password managers. The record of browsers The Meduza Stealer assaults embody a number of variations of Chrome, Edge, Firefox, Opera, Courageous, and dozens extra I’ve by no means even heard of.

    Different famous targets embody the Steam software program consumer, Discord, password managers, two-factor authentication apps, and cryptocurrency pockets extensions.

    Related Posts

    Twitter engaged on video calling options like FaceTime – however why?

    September 15, 2023

    Easy methods to be a part of the Threads beta program and get new options early

    September 12, 2023

    Rumored iPhone 16 Professional solid-state buttons probably scrapped for good

    September 11, 2023

    Deadpool 3 leak reveals a loopy cameo we by no means anticipated from Fox’s Marvel films

    September 8, 2023

    LG Show may even manufacture OLED panels for brand spanking new MacBook Professional

    September 4, 2023

    One different new report says iPhone 15 Skilled Max is getting an unlimited worth hike

    August 12, 2023
    Add A Comment

    Comments are closed.

    Our Picks

    HP Elite Dragonfly G4 First Impressions

    Google Play Video games for PC Beta Launches in Europe and New Zealand

    Firms Assume Their Fool Clients Will Unintentionally Cancel Their Subscriptions if It is Too Straightforward

    Apple Music Classical App is Now Obtainable on Android

    Questioning how workers ought to use ChatGPT? Netskope has an app for that

    Launching quickly, Pokemon Sleep might be a nightmare for cellular gamers

    Watchdog Calls for Recusal of Choose Overseeing Activision Case As a result of Her Son Works for Microsoft

    France Passes New Invoice Permitting Police to Remotely Activate Cameras on Residents’ Telephones

    Categories
    • Artificial Intelligence
    • Cyber Security
    • Mobile
    • News
    • Reviews
    • Tech
    About
    • Privacy Policy
    • About Us
    • Contact US

    Our website is a go-to destination for tech enthusiasts. As a technology blog, we provide a wealth of knowledge on various topics including Artificial Intelligence, Mobile technology, Cyber Security, and the latest Tech News.

    © 2025 Designed by Techbata.com.

    Type above and press Enter to search. Press Esc to cancel.