Raccoon Stealer v2: What You Need to Know…

by

July 25, 2022

Raccoons! Trash pandas! Mother Nature’s bandits. Those sneaky little devils. They’ll be the ruination of us all! Okay, maybe not, but there is a new version of Raccoon Stealer that is making the rounds, and it’s proving to be far more dangerous than the fuzzy bundles of chaos who constantly turn over your garbage cans.

The original Raccoon Stealer that launched in 2019 (via malware-as-a-service channels) was INCREDIBLY versatile. It could steal things like browser passwords, cookies, autofill data, and credit card numbers. You name it. If it was stored in your browser, and you were infected, Raccoon Stealer v1 could grab it.

When the development of Raccoon Stealer abruptly stopped in March of this year (2022), researchers knew it was only a matter of time before something new and improved took its place. That time is now, and Raccoon Stealer v2 is a doozy.

Not only can Raccoon Stealer v2 do all the things its predecessor could and more including:

  • Data Harvesting – Version 1 was limited to individual files. Version 2 can steal any file on any disk.
  • Application Logging – the malware captures a list of every application installed on the machine, helping the attacker learn what type of data files might be available to steal.
  • Screen Capturing – There are LOADS of ways screen captures could be used nefariously. You could take a picture of payment information as it’s entered.  Any type of sensitive data could be captured via screen capture.

How to Protect Yourself

So…this is going to sound really repetitive. Stop me if you’ve heard it before… Raccoon Stealer v2 installs/infects just like every other malware under the sun: via Phishing attacks.

If you’ve fallen out of your seat due to pure shock, I understand. Take the time you need to reconstitute yourself and we’ll move on. Ready? Good.

Phishing attacks (or Phishing in general) is a type of Social Engineering Attack where individuals are targeted by email (or in some cases text messages). The attacker masquerades as someone else (a co-worker, manager, or individual from an outside organization) to manipulate their target.

Carl Keyser is the Content Manager at Integris.

Keep reading

How Can I Measure the ROI in Managed IT Services?

How Can I Measure the ROI in Managed IT Services?

How Can I Measure the ROI in Managed IT Services? The Quick Take Measuring the ROI of managed IT services is crucial for IT managers and C-suite leadership. Here are the key steps: Step #1—Define Goals and Metrics: Set clear goals and identify key performance...

What Are Best Practices for Managing IT Projects?

What Are Best Practices for Managing IT Projects?

What Are Best Practices for Managing IT Projects? The Quick Take Managing IT projects effectively is crucial for ensuring success and maximizing ROI. Here are the best practices to follow: Define Clear Objectives and Scope: Set specific, measurable, achievable,...

What Is The Future of Managed IT Services?

What Is The Future of Managed IT Services?

What Is the Future of Managed IT Services? The Quick Take: The future of managed IT services for small and medium-sized businesses is bright, with the market expected to grow from $1.735 trillion to $2.173 trillion by 2028. Key trends driving this growth include:...