Hacker trap: Fake OnlyFans tool backstabs cybercriminals, steals passwords
Hackers are using a fake OnlyFans account checker to distribute Lumma malware among cybercriminals, highlighting the risks of betrayal and deception within the cybercrime community.
Read original articleHackers are now targeting fellow cybercriminals with a deceptive tool masquerading as an OnlyFans account checker. This tool, instead of verifying stolen credentials, installs the Lumma information-stealing malware on the user's system. Discovered by Veriti Research, this operation highlights the treacherous dynamics within the cybercrime community, where trust can lead to betrayal. The fake checker claims to validate login details and check account balances, but it ultimately serves as a vehicle for malware distribution. Lumma, which has been available for rent since 2022, is known for its advanced capabilities, including stealing two-factor authentication codes and sensitive data like passwords and credit card information. The malware connects to a GitHub account used by the attacker to host additional malicious payloads. This incident is part of a broader trend where hackers have previously targeted each other, employing various tactics to steal credentials and cryptocurrency. The findings underscore the ongoing risks and complexities in the cybercrime landscape, where even those engaged in illicit activities can fall victim to sophisticated scams.
- A fake OnlyFans tool is infecting cybercriminals with Lumma malware instead of verifying credentials.
- Lumma is an advanced information-stealing malware-as-a-service available for rent.
- The malware can steal sensitive data, including two-factor authentication codes and passwords.
- The operation illustrates the treacherous nature of trust among cybercriminals.
- Previous incidents have shown hackers targeting each other with deceptive tactics.
Related
Nation-State Actors Targeting Software Supply Chain via GitHub [2023)
GitHub warns of Lazarus Group, linked to North Korea, targeting cryptocurrency, gambling, and cybersecurity sectors via social engineering. Group aims to breach software supply chains for financial gain. Panther Labs offers security workshop.
A Hacker 'Ghost' Network Is Quietly Spreading Malware on GitHub
Cybersecurity researchers discovered a network of 3,000 fake GitHub accounts, "Stargazer Goblin," spreading malware like ransomware. The operation manipulates GitHub tools, targeting Windows users seeking free software.
A Hacker 'Ghost' Network Is Quietly Spreading Malware on GitHub
Cybersecurity researchers discovered a network of 3,000 fake GitHub accounts, "Stargazer Goblin," spreading malware like ransomware. The network manipulates GitHub's tools to promote malicious repositories targeting Windows users.
Threat Actor Abuses Cloudflare Tunnels to Deliver Rats
Proofpoint reported increased cybercriminal activity using Cloudflare Tunnels to deliver malware, particularly remote access trojans. Campaigns involve phishing emails and exploit temporary tunnels, necessitating adaptive cybersecurity defenses.
We created a new account in Telegram and started looking for a job in Estonia
Holger Roonemaa's experiment revealed illegal job offers on Telegram, including human trafficking and scams targeting Swiss citizens, highlighting the platform's role in criminal activities and challenges for law enforcement.
A great example of cybercrime tools being used for good
Reminds me of how Russian malware never runs if it detects the PC having Russian as the default language
Related
Nation-State Actors Targeting Software Supply Chain via GitHub [2023)
GitHub warns of Lazarus Group, linked to North Korea, targeting cryptocurrency, gambling, and cybersecurity sectors via social engineering. Group aims to breach software supply chains for financial gain. Panther Labs offers security workshop.
A Hacker 'Ghost' Network Is Quietly Spreading Malware on GitHub
Cybersecurity researchers discovered a network of 3,000 fake GitHub accounts, "Stargazer Goblin," spreading malware like ransomware. The operation manipulates GitHub tools, targeting Windows users seeking free software.
A Hacker 'Ghost' Network Is Quietly Spreading Malware on GitHub
Cybersecurity researchers discovered a network of 3,000 fake GitHub accounts, "Stargazer Goblin," spreading malware like ransomware. The network manipulates GitHub's tools to promote malicious repositories targeting Windows users.
Threat Actor Abuses Cloudflare Tunnels to Deliver Rats
Proofpoint reported increased cybercriminal activity using Cloudflare Tunnels to deliver malware, particularly remote access trojans. Campaigns involve phishing emails and exploit temporary tunnels, necessitating adaptive cybersecurity defenses.
We created a new account in Telegram and started looking for a job in Estonia
Holger Roonemaa's experiment revealed illegal job offers on Telegram, including human trafficking and scams targeting Swiss citizens, highlighting the platform's role in criminal activities and challenges for law enforcement.