Wednesday, January 15

Hacker trap: Fake OnlyFans tool backstabs cybercriminals, takes passwords

videobacks.net

are other hackers with phony that declares to take however rather contaminates with -stealing .

The , found by , makes a particular of the blurred lines in between being a or of , where paradoxical and backstabs are plentiful.

“Checking” into a Lumma

OnlyFans is an incredibly -based adult where can generate from (described ”) who spend for to their material.

Developers can , , , and with their , while customers a repeating or one- for material.

Offered its , OnlyFans accounts typically end up being of who try to them to take payments, obtain the to pay a ransom, or leakage images.

Checker are developed to assist confirm of taken (usernames and ), inspecting if the any OnlyFans accounts and whether they' still legitimate.

Without those tools, would to by out countless credential sets, a and laborious procedure that would render the nonviable.

These tools are typically developed by other cybercriminals, triggering hackers to rely that they are to utilize, and in some , this backfires.

Veriti found a of an OnlyFans checker assuring to validate qualifications, examine account , confirm , and figure out however rather up the Lumma information-stealing malware.

' checker on a
: Veriti

The , called “brtjgjsefd.exe,” is brought from a repository and packed into the victim's .

Lumma is an information-stealing () that has actually been leased to cybercriminals because 2022 for -$1000/month and dispersed through numerous ways, consisting of , , gushes, and, more just recently, GitHub remarks.

is an thief with ingenious and the to bring ended . It is primarily understood for taking , , and passwords, , and charge kept on a victim's and file .

Lumma likewise as a loader itself, efficient in presenting extra onto the jeopardized system and carrying out PowerShell scripts.

A wider deceptiveness operation

Veriti discovered that when the Lumma Stealer payload is , it to a GitHub account the “UserBesty,” which the cybercriminal behind this utilizes to other destructive payloads.

Destructive GitHub repository
Source: Veriti

Particularly, the GitHub repository includes executables that look like for accounts, , and an expected contractor:

  • Disney+ account burglars are targeted with “DisneyChecker.exe”
  • Instagram hackers are enticed by “InstaCheck.exe”
  • Wannabe botnet developers are enticed with “ccMirai.exe”

Digging much deeper into the malware's ,

» …
Learn more

videobacks.net