Storm malware can bypass MFA-style identity confirmation
Beware! Storm malware can easily bypass MFA-style identity confirmation and then remotely restore the Session.
Account access protection with Multi-Factors Authentication to prevent hacking by hackers, but it does not fail. Some malware can break through this protection system so that it can steal the victim's account, such as itself.
According to a report by the website, Yahoo has mentioned the detection of a new malware, Storm, by a research team from Varonis Threat Labs, an expert company in cyber detection. Although the source does not indicate the type of malware, many of its capabilities make it possible to predict a malware type of data theft or Infostealer, with the ability to steal a variety of data from the victim's system. One of its key abilities is the theft of sessions on account access, such as Session Cookies and Authentication Session, which allows for the destruction of MFA identity authentication systems. Yes, including information related to passwords such as Autofill and passwords saved on the web browser. This malware supports the theft of data from many web browsers, such as the Chromium family, such as Chrome and the Gecko family, such as Firefox, etc. Not only does it, the malware can also provide other information such as local Documents, Screenshots, Messenger App and Cryptokerrency Wallet.
In addition to the ability to steal data, this malware has a lot of mischief, whether it is smuggling stolen password data back to the C2 or Command and Control servers by encryption or Encryption, the ability to evade endpoint detection and response systems, etc. The malware outbreak has now spread in a variety of countries around the world, including the United States, Brazil, Indonesia, Vietnam, and a variety of other countries, with at least 1,715 victims at the time of the research team's investigation.
More frightening than the above-mentioned capabilities, this malware is sold as rental or MaaS (Malware-as-a-Service) on the underground black market at a tangible price, making it easy to access if it has money. The price starts from $300 ($9,683) for a seven-day trial package, $900 per month ($29,047) for a standard package, $1,800 per month ($58,099.50) for a team-based package that supports up to 100 users, and building up to 200 decoy applications. Subscription is over. The malware will continue to collect data from the victim.
# Trending # Lemon 8 Howtoo # lemon 8 diary # mfa # freedomhack



























































































