Names | Stealc | |
Category | Malware | |
Type | Info stealer | |
Description | (Cofense) Stealc is a relatively new malware family that was first seen in early 2023. It is known as a copycat information stealer because it has a suite of features that is ostensibly based on VIDAR, Raccoon, Mars, and RedLine stealers. By default, Stealc targets data in web browsers, browser extensions, cryptocurrency applications, and email messaging software. | |
Information | <https://cofense.com/blog/luxury-hotels-remain-target-of-social-engineering-attack/> | |
Malpedia | <https://malpedia.caad.fkie.fraunhofer.de/details/win.stealc> |
Last change to this tool card: 13 October 2023
Download this tool card in JSON format
Previous: STASHLOG
Next: Stealer
Changed | Name | Country | Observed | ||
APT groups | |||||
↳ Subgroup: Scattered Spider | [Unknown] | 2022-Jul 2024 | |||
Other groups | |||||
Scully Spider, TA547 | [Unknown] | 2017-Mar 2024 |
2 groups listed (1 APT, 1 other, 0 unknown)
Digital Service Security Center Follow us on |
Report incidents |
|
+66 (0)2-123-1227 | ||
[email protected] |