Luca Stealer Archives – Gridinsoft Blog https://gridinsoft.com/blogs/tag/luca-stealer/ Welcome to the Gridinsoft Blog, where we share posts about security solutions to keep you, your family and business safe. Tue, 25 Jul 2023 09:42:45 +0000 en-US hourly 1 https://wordpress.org/?v=61391 200474804 Luca Stealer Spreads Via a Phishing Microsoft Crypto Wallet Site https://gridinsoft.com/blogs/luca-stealer-phishing-microsoft-crypto-wallet/ https://gridinsoft.com/blogs/luca-stealer-phishing-microsoft-crypto-wallet/#respond Tue, 25 Jul 2023 09:31:13 +0000 https://gridinsoft.com/blogs/?p=16247 With the ever-increasing number of cyber threats, hackers and cybersecurity specialists are taking the initiative. This time, cybercriminals went ahead of the curve. They created a phishing website to coincide with the news that Microsoft was developing a crypto wallet exclusively for its Edge browser. Such a scheme is used to spread Luca Stealer. Microsoft… Continue reading Luca Stealer Spreads Via a Phishing Microsoft Crypto Wallet Site

The post Luca Stealer Spreads Via a Phishing Microsoft Crypto Wallet Site appeared first on Gridinsoft Blog.

]]>
With the ever-increasing number of cyber threats, hackers and cybersecurity specialists are taking the initiative. This time, cybercriminals went ahead of the curve. They created a phishing website to coincide with the news that Microsoft was developing a crypto wallet exclusively for its Edge browser. Such a scheme is used to spread Luca Stealer.

Microsoft Crypto Wallet Scam Spreads Luca Stealer

Not so long ago, news broke on the internet that Microsoft is working on creating a crypto wallet for its Edge browser. This news is sure to interest cryptocurrency users. But you know who else is interested in it? That’s right, cybercriminals. The resourceful guys immediately figured out what was happening and created a website that looked as much like Microsoft’s legitimate site as possible. Cybersecurity researchers came across this website and analyzed it. Unlike third-rate phishing sites, this one had a convincing appearance, a web address of hxxps[:]//microsoft-en[.]com/cryptowallet/, SSL certificates, and allknown logic. The website offers the user to download a beta version of the crypto wallet. However, instead of the claimed one, the user received malware.

Phishing website screenshot
Phishing website

Luca Stealer Analysis

In this case, the scammers are distributing Luca Stealer. Specialists identified it due to similarities in the malware code found and the Luca Stealer. However, Luca is open source, which users can find on platforms like GitHub or TOR. It is a relatively new stealer, written in Rust and first spotted in 2022. Its job is to collect valuable data such as crypto wallet details and other personal information. The following are the browsers, crypto wallets, and extensions this malware attacks.

Web browsers

CentBrowser Iridium Qip Surf Chrome Canary
Sleipnir 5 Vivaldi Elements Browser CocCoc Browser
Torch Opera Stable Brave Kometa
Edge CocMedia Google Chrome Mapple Studio
CozMedia ChromePlus Atom Chromium
UC Browser Opera GX WooGamble Opera
Dragon (Comodo Dragon) Chrome SxS 7star Sputnik
Epic Privacy Browser Chedot Uran Citrio
Orbitum Chrome

Browser extensions

1Password Avira Password Manaager BitApp Wallet BitClip
Bitwarden BinanceChain BrowserPass Byone
Clover Wallet Coin98 Coinbase Wallet CommonKey
Cyano Wallet Cyano Wallet Pro DAppPlay Dashlane
EOS Authenticator EQUAL Wallet Guarda Hycon Lite Client
ICONex KHC KeePassXC Keeper
Keplr LastPass Leaf Wallet Liquality Wallet
Math Wallet MEW CX MetaMask MYKI
Nabox Wallet Nash Extension NeoLine NordPass
Nifty Wallet Norton Password Manager OneKey Polymesh Wallet
RoboForm Sollet Splikity Steem Keychain
TezBox Terra Station TronLink Trezor Password Manager
Wombat Yoroi ZilPay Zoho Vault

Crypto wallets

  • AtomicWallet
  • ByteCoin
  • Electrum
  • Exodus
  • JaxxWallet

In addition to cryptocurrency, malware is interested in banking data such as IBANs. This creates additional risks for those involved in banking transactions.

Data Exfiltration

Once the data is collected, Luca Stealer begins compressing the data for easier transmission. The malware uses the Telegram messaging platform as a covert communication channel. Using a Telegram bot, it discreetly sends stolen data and some statistical information about the stolen data to the operator. It also sends messages to the chat room.

Why Luca Stealer?

Since the source code of Luca Stealer was leaked to the public, attackers can modify it, optimize it and add new functionality. After a more detailed analysis, experts discovered an unusual AntiVM method. Luca Stealer checks the system temperature before starting to execute. Since virtual machines usually generate an error when such a request is made, the malware can understand whether it is on the virtual machine or on a live system. Though, this trick is just about making the analysis longer rather than impossible. It is not hard to make the VM respond properly to the request, returning realistic and consistent temperatures.

Safety recommendations

To avoid unpleasant consequences, we recommend that you follow the following tips:

  • Be careful with downloads from the Internet. Download software only from official and reliable sources. If you have any doubts about the authenticity of a website, go to a trustworthy website and make sure that the site you are interested in is genuine.
  • Update your software. Sometimes OS updates can be inconvenient. However, this is an essential part as updates contain security patches. To address known vulnerabilities, constantly update your operating system and other software, including browsers.
  • Be careful with email messages. According to statistics, email phishing is one of the most effective methods of spreading malware. Do not open suspicious attachments or links in emails from unknown senders.
  • Install reliable antivirus software. Use quality anti-malware software and update it regularly to stay protected from the latest threats.
  • Educate yourself and stay informed. Unfortunately, in this eternal arms race, cybercriminals are leading. This allows them to create new threats, picking the least predictable forms each time. In turn, cybersecurity experts create effective solutions against them. Study up-to-date threats and deception techniques to be more aware and adapt your actions.

Luca Stealer Spreads Via a Phishing Microsoft Crypto Wallet Site

The post Luca Stealer Spreads Via a Phishing Microsoft Crypto Wallet Site appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/luca-stealer-phishing-microsoft-crypto-wallet/feed/ 0 16247
Luca Stealer Source Code Published In The Darknet https://gridinsoft.com/blogs/luca-stealer-published-in-darknet/ https://gridinsoft.com/blogs/luca-stealer-published-in-darknet/#respond Tue, 26 Jul 2022 16:29:58 +0000 https://gridinsoft.com/blogs/?p=9676 Luca Stealer, an omni-purpose stealing malware programmed on Rust, was published on the Darknet forum in recent days. The source code of a well-done stealing tool is now available for everyone. This stealer generally aims at web browsers, particularly the plugins and data that belongs to cryptocurrency wallets and online banking. Luca Stealer functionality As… Continue reading Luca Stealer Source Code Published In The Darknet

The post Luca Stealer Source Code Published In The Darknet appeared first on Gridinsoft Blog.

]]>
Luca Stealer, an omni-purpose stealing malware programmed on Rust, was published on the Darknet forum in recent days. The source code of a well-done stealing tool is now available for everyone. This stealer generally aims at web browsers, particularly the plugins and data that belongs to cryptocurrency wallets and online banking.

Luca Stealer functionality

As analysts from Cyble state in their report, the set of functions Luca malware offers is similar to the ones available in other stealers. It can successfully break into all Chromium-based web browsers, and deliver different types of information to the hacker. In particular, it aims for cookie files, Discord login tokens, accounts on game distribution platforms, credit card info and cryptocurrency wallets. The last two categories of information are obtained through digging the extensions installed in the browser. Malware checks them by the list of installed plugins and, once getting a match, steals the data these plugins store locally. This technique is different from what is usually applied by stealers.

Luca Stealer
The list of cryptowallets Luca Stealer attacks

Besides the categories of data I have mentioned before, Luca Stealer also grabs the information about the attacked system. Using the specific calls, it receives the system memory amount, swap file size, number of CPU cores and so on. After finishing the data collection, Luca packs it into the zip archive and sends it via Discord webhooks, or through bots in Telegram. The choice depends on the size of the resulting file.

There is a single significant difference between Luca and other stealers. It is not able to hijack the cryptocurrency transactions through editing the data copied to clipboard. Still, that function is highly notable for antivirus software. Reading the clipboard contents without the user’s command is suspicious, so the absence of this function makes this malware harder to detect. Moreover, stealing the entire wallet instead of the single transaction may be much more profitable, and the former has more chances to remain undetected.

Luca stealer spreading

It is not clear how exactly this stealer spread. Luca is quite stealthy, as only each fifth antimalware vendor among present on VirusTotal actually detects it. It is likely caused by the programming language of this malware – Rust. It has already appeared in ALPHV/BlackCat ransomware, and showed up as the great way to mask the malware. Additionally, that makes it easier for the crooks to make their malware cross-platform. Usual ways of stealer distribution – through the malicious spamming on different platforms and phishing – will fit Luca as well. But which one will the cybercriminals actually opt for – only God knows.

Is there a reason to be concerned?

There is always a reason to be concerned, if you have anything valuable in a digital form. Cryptocurrencies prices are going up, and so do the hackers’ interest to someones’ savings in crypto. The full-scale pandemic of cryptostealers is already gone, but that makes each new stealer with the ability to dig into crypto wallets even more hazardous. Such programs now cannot just rely on an increased demand on the black market. They should offer something ridiculous – or will definitely fail. There are already around 25 cases of Luca Stealer usage in the wild. Not pretty impressive – but still a lot for a newbie that appeared several days ago.

It is recommended to keep all login information in a separate application, rather than in the web browser. But it will be much better to avoid the infection at all by following the rules of cybersecurity. It is better to make the situation less possible, but never deny the probability of such an unpleasant case.

The post Luca Stealer Source Code Published In The Darknet appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/luca-stealer-published-in-darknet/feed/ 0 9676