
Sign up to save your podcasts
Or


At Cyfirma, we are committed to providing up-to-date information on the prevalent threats and tactics used by malicious actors and with our latest report we delve into a python-based information stealer ‘Akitra Stealer’ and present a comprehensive overview of its functionality and capabilities.
Offered as MaaS (Malware-as-a-Service) on a dedicated website with tag “Akira Undetector”, Akira is an information stealing malware that has potential to exfiltrate a wealth of sensitive data from the compromised host.
The web-portal provides an interface to generate a new stealer binary with instructions to use the malware and leveraging the Telegram channel to provide updates and command-and-control functionality. This malware is capable of harvesting information from web browsers such as saved credentials and payment card details, and trawls the system for information, including username, system ID, hardware details, installed software, network configurations, and uploads the stolen information to the adversary’s account on ‘GoFile’ online file sharing and storage service, and Discord instant messaging service.
Link to the Research Report: Akira Stealer : An Undetected Python Based Info-stealer - CYFIRMA
#CyberSecurity #MalwareAnalysis #AkiraStealer #Cyfirmaresearch #ThreatIntelligence #AkiraUndetector #ETLM
https://www.cyfirma.com/
By CYFIRMAAt Cyfirma, we are committed to providing up-to-date information on the prevalent threats and tactics used by malicious actors and with our latest report we delve into a python-based information stealer ‘Akitra Stealer’ and present a comprehensive overview of its functionality and capabilities.
Offered as MaaS (Malware-as-a-Service) on a dedicated website with tag “Akira Undetector”, Akira is an information stealing malware that has potential to exfiltrate a wealth of sensitive data from the compromised host.
The web-portal provides an interface to generate a new stealer binary with instructions to use the malware and leveraging the Telegram channel to provide updates and command-and-control functionality. This malware is capable of harvesting information from web browsers such as saved credentials and payment card details, and trawls the system for information, including username, system ID, hardware details, installed software, network configurations, and uploads the stolen information to the adversary’s account on ‘GoFile’ online file sharing and storage service, and Discord instant messaging service.
Link to the Research Report: Akira Stealer : An Undetected Python Based Info-stealer - CYFIRMA
#CyberSecurity #MalwareAnalysis #AkiraStealer #Cyfirmaresearch #ThreatIntelligence #AkiraUndetector #ETLM
https://www.cyfirma.com/