Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Dark Web malware logs expose 3,300 users linked to child abuse sites
Global Security

Dark Web malware logs expose 3,300 users linked to child abuse sites

AdminBy AdminJuly 8, 2024No Comments3 Mins Read
Dark Web Malware
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


July 8, 2024Information hallDark Web / Cyber ​​​​Crime

Dark Web malware

An analysis of information-stealing malware logs published on the dark web has led to the identification of thousands of consumers of child sexual abuse material (CSAM), showing how such information can be used to fight serious crime.

“Approximately 3,300 unique users with accounts on known CSAM sources were found”, Recorded Future said in a proof-of-concept (PoC) report published last week. “A notable 4.2% had credentials for multiple sources, suggesting a greater likelihood of criminal behavior.”

Over the past few years, off the shelf info hijackers options became a ubiquitous and an omnipresent threat targeting various operating systems to obtain sensitive information such as credentials, cryptocurrency wallets, payment card data and screenshots.

Cyber ​​security

This is evidenced by the increase in the number of new malicious programs, such as The death of theft, Neptune’s kidnapper, 0bj3ctivity, Poseidon (formerly RodStealer), Satan the kidnapperand StrelaStealer.

Spread through phishing, spam campaigns, hacked software, fake update websites, SEO poisoning, and malicious ads, the data collected by such programs usually end up on the dark web in the form of theft logs from where other cybercriminals acquire them to further their schemes.

Dark Web malware

“Employees routinely store corporate credentials on personal devices or access personal resources on organizational devices, increasing the risk of infection.” — Flare noted in a report last July.

“There is a complex ecosystem in which malware-as-a-service (MaaS) providers sell information-stealing malware on banned Telegram channels, threat actors distribute it via fake hacked software or phishing emails, and then they sell logs of infected devices to specialized dark networks. web markets”.

Recorded Future’s Insikt Group said it was able to identify 3,324 unique credentials used to access CSAM known domains between February 2021 and February 2024, using them to expose three individuals who were found to be holding the accounts entries on no less than four websites.

Cyber ​​security

The fact that the theft logs also contain cryptocurrency wallet addresses means they can be used to determine if those addresses were used to purchase CSAM and other malicious material.

Moreover, countries such as Brazil, India and the US had the highest number of users with credentials for prominent CSAM communities, although the company said this could be due to “over-representation due to the search for data sources”.

“Information-stealing malware and stolen credentials are projected to remain a cornerstone of the cybercriminal economy due to high demand from threat actors seeking initial access to targets,” it said, adding that it shared their findings with law enforcement agencies.

“Theft logs can be used by investigators and law enforcement partners to track child exploitation on the dark web and provide information about the part of the dark web that is particularly difficult to trace.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025

Mirror aims Japan and Taiwan with Roysingmouse and upgraded malicious program

May 8, 2025

Only security tools do not protect you – control efficiency makes

May 8, 2025

Russian hackers using Flackfix Fake CAPTCHA to deploy new malware LostKeys

May 8, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025

Mirror aims Japan and Taiwan with Roysingmouse and upgraded malicious program

May 8, 2025

Only security tools do not protect you – control efficiency makes

May 8, 2025

Russian hackers using Flackfix Fake CAPTCHA to deploy new malware LostKeys

May 8, 2025

Cisco Patches Cve-2025-20188 (10.0 CVSS) in iOS XE, which allows root feat via JWT

May 8, 2025

Ottokit WordPress plugin with 100K+ Instals Hit Gratoits, focused on several disadvantages

May 7, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.