Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Dark Web malware logs expose 3,300 users linked to child abuse sites
Global Security

Dark Web malware logs expose 3,300 users linked to child abuse sites

AdminBy AdminJuly 8, 2024No Comments3 Mins Read
Dark Web Malware
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


July 8, 2024Information hallDark Web / Cyber ​​​​Crime

Dark Web malware

An analysis of information-stealing malware logs published on the dark web has led to the identification of thousands of consumers of child sexual abuse material (CSAM), showing how such information can be used to fight serious crime.

“Approximately 3,300 unique users with accounts on known CSAM sources were found”, Recorded Future said in a proof-of-concept (PoC) report published last week. “A notable 4.2% had credentials for multiple sources, suggesting a greater likelihood of criminal behavior.”

Over the past few years, off the shelf info hijackers options became a ubiquitous and an omnipresent threat targeting various operating systems to obtain sensitive information such as credentials, cryptocurrency wallets, payment card data and screenshots.

Cyber ​​security

This is evidenced by the increase in the number of new malicious programs, such as The death of theft, Neptune’s kidnapper, 0bj3ctivity, Poseidon (formerly RodStealer), Satan the kidnapperand StrelaStealer.

Spread through phishing, spam campaigns, hacked software, fake update websites, SEO poisoning, and malicious ads, the data collected by such programs usually end up on the dark web in the form of theft logs from where other cybercriminals acquire them to further their schemes.

Dark Web malware

“Employees routinely store corporate credentials on personal devices or access personal resources on organizational devices, increasing the risk of infection.” — Flare noted in a report last July.

“There is a complex ecosystem in which malware-as-a-service (MaaS) providers sell information-stealing malware on banned Telegram channels, threat actors distribute it via fake hacked software or phishing emails, and then they sell logs of infected devices to specialized dark networks. web markets”.

Recorded Future’s Insikt Group said it was able to identify 3,324 unique credentials used to access CSAM known domains between February 2021 and February 2024, using them to expose three individuals who were found to be holding the accounts entries on no less than four websites.

Cyber ​​security

The fact that the theft logs also contain cryptocurrency wallet addresses means they can be used to determine if those addresses were used to purchase CSAM and other malicious material.

Moreover, countries such as Brazil, India and the US had the highest number of users with credentials for prominent CSAM communities, although the company said this could be due to “over-representation due to the search for data sources”.

“Information-stealing malware and stolen credentials are projected to remain a cornerstone of the cybercriminal economy due to high demand from threat actors seeking initial access to targets,” it said, adding that it shared their findings with law enforcement agencies.

“Theft logs can be used by investigators and law enforcement partners to track child exploitation on the dark web and provide information about the part of the dark web that is particularly difficult to trace.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025

Why are more security leaders choose AEV

June 6, 2025

New data Wiper Pathwiper Data Wiper violates Ukrainian critical infrastructure in 2025 attack

June 6, 2025

Popular Chrome Extensions API leaks, user data via HTTP and Hard Codes

June 5, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025

Why are more security leaders choose AEV

June 6, 2025

New data Wiper Pathwiper Data Wiper violates Ukrainian critical infrastructure in 2025 attack

June 6, 2025

Popular Chrome Extensions API leaks, user data via HTTP and Hard Codes

June 5, 2025

Researchers in detail in detail decisively developing tactics as it expands its geographical volume

June 5, 2025

Iran related

June 5, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.