• About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us
AimactGrow
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
AimactGrow
No Result
View All Result

New Raven Stealer Malware Hits Browsers for Passwords and Fee Information

Admin by Admin
September 18, 2025
Home Cybersecurity
Share on FacebookShare on Twitter


A brand new sneaky kind of malware, often known as Raven Stealer, has been recognized by the Lat61 Risk Intelligence Crew at Level Wild. The analysis workforce, led by Onkar R. Sonawane, have discovered that this simple-looking program is surprisingly good at staying hidden whereas it steals your private data. The analysis, which was shared with Hackread.com, exhibits that the malware is primarily unfold by way of underground boards and bundled with pirated software program.

Constructed utilizing the programming languages Delphi and C++, Raven Stealer is designed to be small and fast. It really works by quietly moving into your pc, the place its payload (the a part of the malware that does the precise hurt) goes to work.

The payload targets widespread internet browsers like Chrome and Edge to seize issues like your passwords, cookies, fee particulars, and different data you’ve saved. What makes it notably difficult is that it could actually ship this stolen data on to a cybercriminal utilizing a Telegram messaging bot. This implies the unhealthy guys get your knowledge in real-time.

Assault stream, the UI of the file and the generated payload (Picture Credit score: Level Wild)

How It Works

Level Wild’s report explains that Raven Stealer makes use of a intelligent trick referred to as course of hollowing to keep away from being caught by conventional antivirus packages. This implies, as a substitute of leaving a file in your pc’s laborious drive, it really works totally inside your pc’s reminiscence, pretending to be an everyday browser program. It’s like a automobile thief hollowing out a automobile and placing a distinct engine in it, so it appears to be like regular from the surface however is used for one thing else totally. This system makes it powerful for safety software program to identify it.

The malware’s creator used a easy builder program to create the assault file, which hides an encrypted “payload” inside and provides it a novel title to keep away from detection. As soon as on an contaminated pc, it gathers a screenshot and stolen knowledge right into a ZIP file, then tries to ship it to the attacker by way of Telegram. Though this transmission failed in testing resulting from a Telegram bot token downside, the specter of knowledge theft stays.

Defending Your self

To maintain your private data secure from threats like this, at all times use up-to-date antivirus software program with real-time safety and keep away from downloading pirated packages. It’s additionally clever to watch out about clicking on suspicious hyperlinks or attachments.

As Dr. Zulfikar Ramzan, CTO of Level Wild and Head of the Lat61 Risk Intelligence Crew, explains, “Raven Stealer exhibits how commodity malware is evolving – stealing credentials, cookies, and fee knowledge whereas hiding its tracks by way of in-memory execution and Telegram exfiltration. It’s a reminder that attackers are packaging superior methods into instruments that even low-skilled actors can use.”



Tags: BrowsersDataHitsMalwarePasswordsPaymentRavenStealer
Admin

Admin

Next Post
Bloodlines 2 Will not Lock Clans Behind Paywall After Fan Backlash

Bloodlines 2 Will not Lock Clans Behind Paywall After Fan Backlash

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended.

Most Parked Domains Now Serving Malicious Content material – Krebs on Safety

Most Parked Domains Now Serving Malicious Content material – Krebs on Safety

December 17, 2025
Towards leggerio | Seth’s Weblog

Good instincts | Seth’s Weblog

April 22, 2025

Trending.

The way to Clear up the Wall Puzzle in The place Winds Meet

The way to Clear up the Wall Puzzle in The place Winds Meet

November 16, 2025
Mistral AI Releases Voxtral TTS: A 4B Open-Weight Streaming Speech Mannequin for Low-Latency Multilingual Voice Era

Mistral AI Releases Voxtral TTS: A 4B Open-Weight Streaming Speech Mannequin for Low-Latency Multilingual Voice Era

March 29, 2026
Moonshot AI Releases 𝑨𝒕𝒕𝒆𝒏𝒕𝒊𝒐𝒏 𝑹𝒆𝒔𝒊𝒅𝒖𝒂𝒍𝒔 to Exchange Mounted Residual Mixing with Depth-Sensible Consideration for Higher Scaling in Transformers

Moonshot AI Releases 𝑨𝒕𝒕𝒆𝒏𝒕𝒊𝒐𝒏 𝑹𝒆𝒔𝒊𝒅𝒖𝒂𝒍𝒔 to Exchange Mounted Residual Mixing with Depth-Sensible Consideration for Higher Scaling in Transformers

March 16, 2026
Exporting a Material Simulation from Blender to an Interactive Three.js Scene

Exporting a Material Simulation from Blender to an Interactive Three.js Scene

August 20, 2025
Efecto: Constructing Actual-Time ASCII and Dithering Results with WebGL Shaders

Efecto: Constructing Actual-Time ASCII and Dithering Results with WebGL Shaders

January 5, 2026

AimactGrow

Welcome to AimactGrow, your ultimate source for all things technology! Our mission is to provide insightful, up-to-date content on the latest advancements in technology, coding, gaming, digital marketing, SEO, cybersecurity, and artificial intelligence (AI).

Categories

  • AI
  • Coding
  • Cybersecurity
  • Digital marketing
  • Gaming
  • SEO
  • Technology

Recent News

Credulous

Settling | Seth’s Weblog

April 12, 2026
Banks Penalize Unhealthy Cybersecurity With Greater Charges

Banks Penalize Unhealthy Cybersecurity With Greater Charges

April 12, 2026
  • About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved

No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved