
0:00
28:11
Today we are joined by Selena Larson, Threat Researcher at Proofpoint, and co-host of Only Malware in the Building, as she discusses their work on "Amatera Stealer - Rebranded ACR Stealer With Improved Evasion, Sophistication." Proofpoint researchers have identified Amatera Stealer, a rebranded and actively developed malware-as-a-service (MaaS) variant of the former ACR Stealer, featuring advanced evasion techniques like NTSockets for stealthy C2 communication and WoW64 Syscalls to bypass user-mode defenses.
Distributed via ClearFake web injects and the ClickFix technique, Amatera leverages multilayered PowerShell loaders, blockchain-based hosting, and creative social engineering to compromise victims. With enhanced capabilities to steal browser data, crypto wallets, and other sensitive files, Amatera poses a growing threat in the wake of disruptions to competing stealers like Lumma.
Complete our annual audience survey before August 31.
The research can be found here:
Amatera Stealer: Rebranded ACR Stealer With Improved Evasion, Sophistication
Learn more about your ad choices. Visit megaphone.fm/adchoices
Altri episodi di "CyberWire Daily"
Non perdere nemmeno un episodio di “CyberWire Daily”. Iscriviti all'app gratuita GetPodcast.