Security researchers have followed the
evolution of a piece of infostealer malware named Raccoon, as it’s being
developed and enhanced to work in as many scenarios as possible, including
email clients, Internet browsers, and more.
Infostealers are a type of malware
designed for a very specific purpose, to steal credentials from as many sources
as possible. Raccoon is one such tool that’s developed as a
malware-as-a-service, which means it’s available to cybercriminals through various
forums. More precisely, it’s rented at $75 per week or $200 per month, and deploying
it doesn’t require extensive technical knowledge.
The Racoon malware, initially spotted in
the wild in April 2019, was built to steal all kinds of information, such as
credentials, credit card information, and even cryptocurrency wallets. Since
it’s distributed as malware-as-a-service, it’s continuously adapted and
enhanced to cover more and more avenues. As it stands, it covers almost 60 apps
including email clients, most Internet browsers, and major cryptocurrency
wallets.
This malware can spread to unsuspecting
victims in two ways. One is through exploit kits embedded into a website to infect
users with unpatched browsers and operating systems. The other is through
phishing campaigns that persuade people to open a Microsoft Office email and
run a macro script.
What’s interesting about this malware is
that its developers are expanding features to include ever-more attack vectors.
“Raccoon targets 29 chromium-based
browsers including Google Chrome, Opera, etc that have the same folder
structure and share a similar codebase, which leads to a similar way of
handling sensitive data,” explain
the researchers.
“The stealer also relies on the
same methodology for Mozilla based applications. When looking for
cryptocurrency wallets, Racoon targets popular applications like Exodus, Jaxx
and more.”
While this relatively new malware is not
all that complex and dangerous, the fast rate of development makes it a
favorite for attackers, especially since it doesn’t require programming experience.
The best ways for people and companies to stay safe is to keep devices and
software up to date, to use a security solution, and to be wary of potential
phishing campaigns.