Express Computer
Home  »  News  »  Researchers at Seqrite Labs expose AsukaStealer, an advanced malware threat

Researchers at Seqrite Labs expose AsukaStealer, an advanced malware threat

0 64

Seqrite, the enterprise arm of Quick Heal Technologies Limited, a global cybersecurity solutions provider, has uncovered a sophisticated new malware threat known as AsukaStealer. As per the detailed analysis conducted by researchers at Seqrite Labs, India’s largest malware analysis lab, this advanced persistent threat, currently being marketed on Russian-language cybercrime forums, presents a severe risk to individuals and organisations worldwide, highlighting the evolving landscape of cyber threats. AsukaStealer operates on a Malware-as-a-Service model, offered by a threat actor using the alias ‘breakcore’ for a monthly subscription fee of $80. This model makes advanced cyber-attack capabilities accessible to a wider range of malicious actors, significantly lowering the barrier to entry for cybercriminals.

The sophistication of AsukaStealer lies in its broad target range and extensive data extraction capabilities. It is designed to infiltrate a comprehensive array of browsers, including Mozilla Firefox, Google Chrome, Microsoft Edge, Opera, and numerous others. This wide-reaching approach ensures maximum impact across various browsing platforms. The malware can extract a wealth of sensitive information, including extension data, internet cookies, saved login credentials, cryptocurrency wallet information, FTP client data, messaging platform details, and gaming software data.

AsukaStealer specifically checks for systems in various countries, including Armenia, Azerbaijan, Belarus, Kazakhstan, and others. It collects extensive system information, including CPU details, OS version, RAM, and time zone.

The malware’s reach is expansive, programmed to steal data from over 30 different browsers, including less common ones like Iridium, Chedot, and Sleipnir5. It also targets over 20 different cryptocurrency wallets, including emerging ones like Zecrey, LeapCosmosWallet, and VenomWallet. AsukaStealer uses the UuidCreate function to generate unique identifiers for exfiltrated files, enhancing its ability to track and organize stolen data.

To mitigate the risks posed by AsukaStealer and similar threats, Seqrite strongly advises individuals and organisations to implement comprehensive security measures. These include deploying and maintaining up-to-date antivirus and anti-malware solutions, implementing strong, unique passwords for all accounts, enabling multi-factor authentication, exercising caution with email attachments and links, regularly updating all software and operating systems, conducting security awareness training, implementing network segmentation and the principle of least privilege, and regularly backing up critical data.

Get real time updates directly on you device, subscribe now.

Leave A Reply

Your email address will not be published.

LIVE Webinar

Digitize your HR practice with extensions to success factors

Join us for a virtual meeting on how organizations can use these extensions to not just provide a better experience to its’ employees, but also to significantly improve the efficiency of the HR processes
REGISTER NOW 

Stay updated with News, Trending Stories & Conferences with Express Computer
Follow us on Linkedin
India's Leading e-Governance Summit is here!!! Attend and Know more.
Register Now!
close-image
Attend Webinar & Enhance Your Organisation's Digital Experience.
Register Now
close-image
Enable A Truly Seamless & Secure Workplace.
Register Now
close-image
Attend Inida's Largest BFSI Technology Conclave!
Register Now
close-image
Know how to protect your company in digital era.
Register Now
close-image
Protect Your Critical Assets From Well-Organized Hackers
Register Now
close-image
Find Solutions to Maintain Productivity
Register Now
close-image
Live Webinar : Improve customer experience with Voice Bots
Register Now
close-image
Live Event: Technology Day- Kerala, E- Governance Champions Awards
Register Now
close-image
Virtual Conference : Learn to Automate complex Business Processes
Register Now
close-image