Automatically translated.View original post

Storm malware can bypass MFA-style identity confirmation

Beware! Storm malware can easily bypass MFA-style identity confirmation and then remotely restore the Session.

Account access protection with Multi-Factors Authentication to prevent hacking by hackers, but it does not fail. Some malware can break through this protection system so that it can steal the victim's account, such as itself.

According to a report by the website, Yahoo has mentioned the detection of a new malware, Storm, by a research team from Varonis Threat Labs, an expert company in cyber detection. Although the source does not indicate the type of malware, many of its capabilities make it possible to predict a malware type of data theft or Infostealer, with the ability to steal a variety of data from the victim's system. One of its key abilities is the theft of sessions on account access, such as Session Cookies and Authentication Session, which allows for the destruction of MFA identity authentication systems. Yes, including information related to passwords such as Autofill and passwords saved on the web browser. This malware supports the theft of data from many web browsers, such as the Chromium family, such as Chrome and the Gecko family, such as Firefox, etc. Not only does it, the malware can also provide other information such as local Documents, Screenshots, Messenger App and Cryptokerrency Wallet.

In addition to the ability to steal data, this malware has a lot of mischief, whether it is smuggling stolen password data back to the C2 or Command and Control servers by encryption or Encryption, the ability to evade endpoint detection and response systems, etc. The malware outbreak has now spread in a variety of countries around the world, including the United States, Brazil, Indonesia, Vietnam, and a variety of other countries, with at least 1,715 victims at the time of the research team's investigation.

More frightening than the above-mentioned capabilities, this malware is sold as rental or MaaS (Malware-as-a-Service) on the underground black market at a tangible price, making it easy to access if it has money. The price starts from $300 ($9,683) for a seven-day trial package, $900 per month ($29,047) for a standard package, $1,800 per month ($58,099.50) for a team-based package that supports up to 100 users, and building up to 200 decoy applications. Subscription is over. The malware will continue to collect data from the victim.

# Trending # Lemon 8 Howtoo # lemon 8 diary # mfa # freedomhack

2 days agoEdited to

... Read moreจากประสบการณ์ส่วนตัวที่ต้องดูแลความปลอดภัยของข้อมูลบนอุปกรณ์หลายเครื่อง ผมขอแชร์ข้อควรระวังเกี่ยวกับมัลแวร์ Storm ซึ่งไม่ได้เป็นแค่ภัยคุกคามทั่วไป แต่เป็นมัลแวร์ที่มีเทคนิคขั้นสูงในการขโมยข้อมูล โดยเฉพาะความสามารถขโมย Session Cookies และ Authentication Session ซึ่งหมายความว่ามันสามารถเลี่ยงการยืนยันตัวตนแบบ MFA ได้อย่างชำนาญ หลายครั้งเรามักจะพึ่งพาการตั้งค่าความปลอดภัยขั้นสูง เช่น MFA เพื่อป้องกันบัญชีถูกแฮก แต่มัลแวร์ตัวนี้แสดงให้เห็นว่า การมี MFA อย่างเดียวอาจไม่เพียงพอ เราควรเสริมด้วยการใช้โปรแกรมป้องกันมัลแวร์ที่มีความสามารถตรวจจับพฤติกรรมที่ผิดปกติ รวมถึงระมัดระวังการติดตั้งแอปหรือซอฟต์แวร์ที่ไม่น่าเชื่อถือ ที่น่าสนใจคือมัลแวร์ Storm ยังสามารถขโมยข้อมูลอื่น ๆ เช่น ไฟล์เอกสารบนเครื่อง การจับภาพหน้าจอ และข้อมูลจากแอปพลิเคชันส่งข้อความ รวมถึงกระเป๋าเงินคริปโตซึ่งเพิ่มความเสี่ยงให้กับผู้ใช้ที่เก็บข้อมูลสำคัญเหล่านี้บนเครื่องเดียวกัน ทั้งนี้เราควรทำการอัปเดตซอฟต์แวร์และเบราว์เซอร์อย่างสม่ำเสมอ ใช้รหัสผ่านที่แข็งแรงและไม่ซ้ำกัน รวมถึงเปิดใช้ระบบแจ้งเตือนเมื่อมีการล็อกอินจากอุปกรณ์หรือสถานที่ใหม่ เพื่อเพิ่มระดับการป้องกันการเข้าถึงโดยไม่ได้รับอนุญาต สุดท้าย การที่มัลแวร์ Storm ถูกจำหน่ายในรูปแบบ Malware-as-a-Service (MaaS) ทำให้ภัยนี้แพร่หลายและเข้าถึงง่ายขึ้น จึงจำเป็นที่ผู้ใช้งานทั่วไปและองค์กรต้องตื่นตัวในการรักษาความปลอดภัยไซเบอร์อย่างจริงจัง และมีการอบรมให้ความรู้แก่ทุกคนในทีม เพื่อป้องกันไม่ให้เกิดความเสียหายจากการถูกโจมตีทางไซเบอร์ในยุคนี้

Related posts

It's no secret that Karol G just slayed the #Grammys #Glambot . #AwardsSeason
user6854050772614

user6854050772614

10 likes

Developing a career in cybersecurity
Hey All! 👋 Want to stay safe online and protect your data? Cybersecurity knowledge is essential. It helps you secure your personal information and understand how to safeguard your digital footprint. Let’s dive into why it’s crucial! 💻🔒 Why Cybersecurity Matters Cybersecurity is about protecting
Meghana

Meghana

549 likes

⚡ How to Make Your PC Run Faster – 5 Easy Tips! 🖥️🔥
💡 1. Disable Startup Programs 🚀 Too many apps launching at startup slow down your PC! ✅ Open Task Manager (Ctrl + Shift + Esc) ✅ Go to the Startup tab ✅ Disable unnecessary apps to speed up boot time 💡 2. Clean Temporary Files 🗑️ Over time, junk files slow your system down. ✅ Press Win
skaeszun

skaeszun

284 likes

+it’s less than 80$✨❗️LINK for this item in my bio❗️
Details⬇️: This flip phone smartphone with a flip keyboard design, offering both the convenience of a traditional keypad and the functionality of a modern touchscreen device. With 4GB of internal storage, you'll have plenty of space for apps, photos, and more. The compact 3.5" displa
Atlas

Atlas

443 likes

ERROR ERROR ERROR ERROR ERROR
🔺️!!!Flashy!!!🔺️ Um guys... Something is definitely wrong with my tablet 😬😨 #rewritesonic #malware #sonicexe #sonicthehedgehog #sonicfanart
EmK & Fidgi

EmK & Fidgi

2 likes

Check out this website that helps you when you’re feeling uninspired! I walk you thru the process of downloading the svg file to taking it to cricut design space! Happy crafting. #designinspo #creativeart #cricutprojects #svgfiles #CricutTips
VlunaWorks

VlunaWorks

42 likes

A vibrant cover image featuring Anjali Viramgama amidst confetti, with the title "Top Cybersecurity Certificates." It highlights key certifications for advancing skills and knowledge in cybersecurity.
A card detailing the Certified Information Security Manager (CISM) certification. It explains CISM focuses on managing information security programs, covering risk management, governance, and incident response.
A card detailing the Certified Ethical Hacker (CEH) certification. It explains CEH focuses on ethical hacking and penetration testing, covering topics like network scanning, malware threats, and social engineering.
Top Cybersecurity Certificates
There are several reputable cybersecurity certifications that can help you advance your skills and knowledge in the field of cybersecurity. 1. Certified Information Systems Security Professional (CISSP): - CISSP is a globally recognized certification that covers a wide range of cybersecurit
anjali.gama

anjali.gama

110 likes

3 cybersecurity jobs that pay well
1. Security Analyst - What They Do: Monitor networks for vulnerabilities, investigate breaches, and implement security measures. - How to Start: - Obtain certifications like CompTIA Security+ or CySA+. - Gain experience with tools like SIEM (e.g., Splunk). - Start in an I
vedha | career tips (tech) 👩‍

vedha | career tips (tech) 👩‍

631 likes

😫 Wanting to quit your 9-5?
Becoming a Pinterest Manager might be for you! In less than a year, I went from earning $2K at my 9-5 to over $4K/month with Pinterest management alone. Now, with all the different skills and platforms I lesrned, I make anywhere from $12-15K A MONTH! Back then, I knew I had to do something
Bria | Social, Design, & AI

Bria | Social, Design, & AI

482 likes

Back Up Outlook Emails to an External Hard Drive
Need to back up your Outlook emails to an external hard drive? Here are 2 simple methods to help you out. Download AOMEI Backupper and give it a try! #backup #outlook #externalharddrive
SmoothTechie

SmoothTechie

1 like

Why I switched to taking notes on my iPad
I used to love writing in notebooks, but after switching to my iPad, I can confidently say I’m never going back! Here’s why: ✨ Cuter Notes – Let’s be real…aesthetic notes make studying more enjoyable! I can use custom colors, cute stickers, and different handwriting styles to make my notes visua
Rebecca R.

Rebecca R.

263 likes

A young woman with long dark hair, wearing a pink satin shirt, smiles at the camera while sitting at a table. Overlay text reads: 'Tools and sites I use as a cybersecurity student to progress my skills and keep me interested in studying'.
A screenshot of 'The Hacker News' website, displaying various cybersecurity news articles from January 2025, including topics like vulnerabilities, malware, cyber espionage, and AI jailbreak methods. An ad for Zscaler and a banner for CIS Hardened Images are also visible.
A screenshot of the O'Reilly learning platform, showing various books and expert playlists related to AI, engineering, and data. Overlay text highlights the subscription cost ($50/month or $499/year) and its value for accessing books and live events.
Tools and sites I use as a cybersecurity student 🌸
#cybersecuritystudent #cybersecurity #techgirlie
LexiStudies

LexiStudies

104 likes

SOS!!! Wha do you do if you click a phishing email link… two times?!? So far I have: 1, added two factor sign on 2, changed my passwords 3, stress cried and spiraled But for real. What do you do… how do I know if there is now malware (? Is that what it’s called ?) living on my computer?!?
Alexandra Wildeson

Alexandra Wildeson

2 likes

A colorful Disney tattoo of Stitch from Lilo & Stitch on an arm, featuring a watercolor-style blue and purple splatter background. The character is depicted with a wide, happy grin and outstretched arms, showcasing a vibrant and playful design.
A Disney tattoo on an arm featuring Thumper from Bambi, sitting among purple and blue flowers and tall grass. The tattoo includes the text "Macushla R.I.P. Johnny" below the character, rendered in a traditional tattoo style.
A traditional-style Disney tattoo on a leg depicting Esmeralda from The Hunchback of Notre Dame. She is shown in a flowing purple dress, holding a large crescent moon or hoop, surrounded by golden stars. The text "From my flash! Tiny blast over" is visible.
🏰✨Disney Tattoos✨🏰
Did you know, I’m a HUGE Disney nerd! It’s always a treat whenever I get to do something based on Disney, small or big, flash or custom 🥰 Here’s just a small compilation of some of my favorites! #disney #disneytattoo #tattoo #tattooartist #traditionaltattoo
Malware 🔜 FC

Malware 🔜 FC

375 likes

Don’t Use Airport USB Chargers!
TSA is now advising NOT to use Airport USB Chargers. Bring your own USB charging bricks. "Hackers can install malware at USB ports (we’ve been told that’s called 'juice/port jacking'). So, when you’re at an airport do not plug your phone directly into a USB port. Bring your TSA-compl
Destination & Travel Junkies

Destination & Travel Junkies

151 likes

You need TikTok ?
Here is how you can download TikTok if you need help with and apple phone just ask me I can help with Apple phone you need to change your region on the Apple Pay store
Ali

Ali

10 likes

warm sultry combo
omg @Andromeda’s Moon tihota dust has me in a hold! it smells so amazing! I can't wait for it to be back in stock! Top notes are Bourbon Vanilla, Mango, Coconut Water and Mate; middle notes are Vanilla, Matcha Tea, Brown sugar, Amber and Star Jasmine; base notes are Vanilla, Tonka, Sandalwo
✨ Malware Noir ✨

✨ Malware Noir ✨

1 like

Elite Hacker Destroyed His Empire By Forgetting On
Bro, I really forgot to use a VPN 💀 #hacker #cybercrime #fail #tech #arrestedstupidly
arrestedstupidly

arrestedstupidly

1 like

📍USB Write Protected? Fix It Instantly
Seeing “The disk is write-protected” error on your USB drive? This quick guide shows how to remove write protection and regain full access to your files. Learn how to check the physical lock switch, use DiskPart commands, repair file system errors, and fix registry issues step by step. Many cases a
XanthusTechCore

XanthusTechCore

5 likes

Recover Hidden Files from USB Using Command Prompt
Can’t see your files on a USB stick even though they’re there? This video shows how to use Command Prompt commands (like attrib) to unhide files hidden by system attributes or viruses — plus what to try if that doesn’t work. #USB #cmdanks #windows 11 #techtutorial #newonlemon8
XanthusTechCore

XanthusTechCore

2 likes

Revelry in the Dark
#myheroacademia #mha #bokunoheroacademia #bnha #tokoyami
Malware X20

Malware X20

5 likes

productivity apps on your mac!
Proton VPN for staying secure online and Grammarly for making sure I don’t send embarrassing emails literally two apps I use daily to stay productive without the stress. If you’re not using them yet, you’re missing out! #lemon8partner #lemon8creator #tech #apps #productivity
asmae🐸

asmae🐸

19 likes

A black journal featuring a white drawing of Jack Skellington's face and stars, held by a hand.
A journal spread featuring handwritten lyrics for "Sally's Song" from The Nightmare Before Christmas, adorned with various character stickers from the movie.
A journal spread with religious quotes and Bible verses about hope, rejoice, and faith, decorated with cross stickers and floral designs.
Journal Spreads ive done recently
okay its been a few months but so far i did great with all the stickers i love buyings stickers now as a comfort thing idk how to say it ig? but overall my journal spreads look so good so far i hope yall like it js as much as i do<3 anywho im waiting for an upcoming concert to add i cant wait to
mal<3

mal<3

162 likes

A person with long dark hair and a straw hat walks through a sunny public square. Overlay text reads "CYBERSECURITY CAREER Tips to get started," introducing advice for a career in cybersecurity.
A person in a white dress walks on a path next to green bushes. Overlay text advises to "Build a Strong Technical Foundation" by learning networking basics, operating systems, and scripting languages.
People walk across a street with benches and trees in the background. Overlay text suggests to "Get Hands-On Experience" through CTF competitions, cybersecurity challenges, and setting up a home lab.
Tips for pursuing a career in cybersecurity
1. Build a Strong Technical Foundation A solid understanding of systems, networks, and programming is essential for identifying and mitigating security threats. • Learn networking basics (e.g., TCP/IP, firewalls, VPNs). • Gain familiarity with operating systems (Windows, Linux)
vedha | career tips (tech) 👩‍

vedha | career tips (tech) 👩‍

130 likes

A pink iMac setup on a white desk, featuring a keyboard, mouse, a green drink, decorative figurines, flowers, and makeup products. The screen displays a landscape painting, and 'lemon8 @peachie.suga' is visible.
A digital slide titled 'Software & System Security' with tips to keep browsers and OS updated, install antivirus, and turn on firewalls. It features a shield icon and 'lemon8 @peachie.suga'.
A digital slide titled 'Email & Messaging Safety' with tips to be suspicious of urgent emails, avoid shady attachments, and watch out for fake notifications. It features an envelope icon and 'lemon8 @peachie.suga'.
how to protect your devices from viruses! Pt 2
‧°𐐪♡𐑂°‧₊ 💌 Your device & inbox deserve protection too 💻📬 Here are small but powerful ways to stay safe online: 🛡️ Software & System Security – always update your OS & browser, turn on your firewall, and scan regularly for threats 📧 Email & Messaging Safety – avoid suspicious lin
peachiesuga ♡

peachiesuga ♡

30 likes

✨ Stand out during the holidays with this combo!
Tonight's combo is one that will make you stand out. Key notes: Honey, vanilla, amber. With a light hint of tobacco. 💌 Brand: @TheTipsyGoatSoapCompany Honey Toffee 💌 Brand: @Jebouri | Arabian Perfumery honey amber 💌 Brand: @Guerlain Tobacco Honey #عطر #عطور #perfumetiktok #
✨it's malware✨

✨it's malware✨

1 like

A person points at a computer screen displaying various app icons and text like "Customize your AI chats with this tool TypingMind" and "The best of Setapp". Overlays read "Tech tips", "Netflix of Productivity", and "Mac Edition!".
Against a lake background, two app icons are shown: CleanMyMac and Paste. Text describes CleanMyMac for tidying Macs and Paste as a clipboard for saving copied content.
Against a lake background, two app icons are shown: TextSniper and Ulysses. Text describes TextSniper for extracting text from visuals and Ulysses for writing and publishing.
Mac Productivity Apps: Make More Time for YOU! 💻
Let’s talk about one of the most important things in our daily routines—our workflow. Whether you’re working for yourself, managing a side hustle, or simply trying to keep everything in check, examining and refining your workflow is key to getting more done with less stress. 💪 By finding simple, ef
Cas Lin

Cas Lin

35 likes

In this img, I strip back the layers of a malware
STOP installing random .exe files! 🛑 This 'Physics Simulator' is actually malware in disguise. See how it hooks your keyboard in the background. Tag a friend who downloads too many mods. #cybersecurity #scamalert #keylogger
ShadowRoot17

ShadowRoot17

1 like

How to Make a Dyson Sphere in Sandboxels
#dysonsphere #science #sciencegames #gaming #pixelart
R74n

R74n

7 likes

Never plug your phone or computer into usb plugs in hotels or airports here’s why 👇🏼 A USB port doesn’t just deliver power, it can also transfer data. A compromised hotel USB outlet could secretly install malware on your phone or copy your data without you realizing it. Hotels, airports, and o
Cybersecurity Girl

Cybersecurity Girl

149 likes

A Ben 10 gym audio for you. #fyp #gym #ben10 #ben10omniverse #audio
IzzyywiththeZ

IzzyywiththeZ

0 likes

A series I’ve wanted to do forever! As a cyber security expert and bridal makeup artist I hope to share cyber concepts in easy to understand makeup metaphors! Let me know in the comments what topics interest you 💕 #makeupandmalware #mascara #cybersecurity @Lancôme
Betsy H

Betsy H

3 likes

A few updates to my journal 🖤🤗
#journalthrough #journal
mal<3

mal<3

15 likes

Free Games! ✅
Free Games! ✅ Yes it’s trusted by many people and it’s the best in the industry! And no malware or virus! Follow for more value! 😉 #freegames #pcgamers #steamgames #gamer #tech
Tech With Unes

Tech With Unes

7 likes

If you’re staring at Cricut Design Space with zero ideas this is for you! This free SVG website is perfect when you need inspiration fast. Save & share with your crafty bestie 💖 #designinspo #creativeart #DesignProcess #cricutprojects #CricutTutorial
VlunaWorks

VlunaWorks

1 like

A colorful fursuit character, Malware 2.0, stands on train tracks, viewed from behind. They wear a black hoodie with a vibrant mushroom graphic and a striped tail. The background features dry grass and trees under an overcast sky.
A colorful fursuit character, Malware 2.0, stands on train tracks, facing forward. They wear a black jacket, a graphic t-shirt, black pants, and sneakers. The fursuit head, paws, and striped tail are visible.
A colorful fursuit character, Malware 2.0, leans against a metal pole beside a paved path. They wear a black jacket, graphic t-shirt, black pants, and sneakers. A grassy field and distant houses are in the background.
⛓️🥀Edgy Fursuit Photos🥀⛓️
Almost took a year but I finally got decent suit photos of Malware 2.0. Have been wanting to get photos of her in my ReallyHungryAnimals.Club @/noflightzone x @/DominoTwist jacket for a while now. Shirt by another talented friend, @/danneroni 🖤 headbase by @/LatinVixen and everything else suit wise
Malware 🔜 FC

Malware 🔜 FC

5 likes

A laptop screen displays the Cool Math Games website, with the URL visible. A cursor hovers over the logo, and text overlay reads 'my favorite Nostalgic Gaming Website' with a Saturn icon.
A laptop screen shows a list of 'Papa's' cooking games on Cool Math Games, including Pizzeria, Freezeria, and Burgeria. Text overlay says 'The best games on the site tbh', with heart doodles highlighting some titles.
A laptop screen displays the game 'Bloxorz' on Cool Math Games, showing the start menu. Text overlay states, 'This game was one of the most popular at my school. I still love the vibes and the music.'
my favorite nostalgic gaming website...💻🕹🎲
Did anyone else get to play this on the computers at school!? #letschat #nostalgicgaming #embracevulnerability #Lemon8Diary #childhoodmemories #girlhood #gamergirl #websites #throwback #schoolmemories
CrystalViolet🫧

CrystalViolet🫧

45 likes

🚨 16 Billion passwords leaked - the largest breach ever 🚨 Here is how it happened and what you can do to be safe. #news #databreach #cybersecuritytips #onlinesafety
Cybersecurity Girl

Cybersecurity Girl

121 likes

A hand holds a pink iPhone with text 'Tech 101 For Beginners' and 'Tips to help Non-Tech Savvy Users,' accompanied by laptop and phone app icons, against a brick background.
A pink iPhone in its box, illustrating the tip to 'Keep Your Devices Updated' with text explaining why updates help and advising to enable automatic updates.
An iPhone screen displaying app icons and display settings, accompanying the tip to 'Use Strong, Unique Passwords' with reasons why and advice on using combinations and password managers.
Tech Hacks For Beginners 📲💻😬
I have some great tips for non-tech savvy tech users. I know these tips will help you learn your tech more quickly and effectively. 1. Keep Your Devices Updated Why It Helps: Updates often contain security patches and improvements that help your device run smoothly. Tip: Enable automatic updat
Joy 📚

Joy 📚

282 likes

#batman is not the world’s greatest detective in fact he’s like the latest detective to find the guild. The world’s greatest detective is #detectivechimp #dccomics
Dan!

Dan!

3 likes

Hackers hijacked antivirus features to install mal
Hackers hijacked antivirus features to install malware - here's what we know https://www.yahoo.com/tech/cybersecurity/articles/hackers-hijacked-antivirus-features-install-140500891.html #hackers #malware #cybersecurity #antivirus
angela1957

angela1957

1 like

You Won’t Expect This
You Won’t Expect This #thenewearth #newearth #earth #multidoimensional #dimension
Smooth DoubleB

Smooth DoubleB

0 likes

See more