If you haven’t heard of a malware strain called Predator the Thief, it belongs on your radar. Understanding threats like this is essential for effective cyber attack prevention, especially as cybercriminals continue to refine their methods.
This malware first appeared as a significant threat in July 2018, when cybercriminals used it in an extensive phishing campaign. In its original version, Predator the Thief stole passwords, browser data, usernames, and the contents of cryptocurrency wallets. It also accessed victims’ webcams, took pictures, and sent all collected data to a command-and-control server.
Unfortunately, hackers have been actively enhancing the malware. The latest version appeared in the wild with new capabilities that make detection by antivirus programs more difficult. These updates further highlight the importance of cyber attack prevention.
Hackers have also upgraded their phishing campaigns, using new documents to lure victims into installing malicious code. Fortiguard Labs identified the updated version, 3.3.4, which the hackers released on Christmas Eve, 2019.
Although researchers have not identified the group behind Predator the Thief, forensic analysis suggests it is Russian in origin. This conclusion stems from the malware’s design, which prevents it from operating in countries like Armenia, Belarus, Kazakhstan, Kyrgyzstan, Moldova, Russia, Tajikistan, Turkmenistan, Ukraine, or Uzbekistan—nations typically excluded from Russian hackers’ targets.
To reduce the risk of attacks by Predator the Thief, Fortiguard researchers recommend disabling macros by default and keeping all software, including operating systems, fully patched and up to date. These strategies are vital not only for this specific threat but also for general cyber attack prevention.
Stay vigilant. In today’s digital landscape, prioritizing cybersecurity is more important than ever.
cybersecurity.
Used with permission from Article Aggregator