Credential Theft Malware Infected 1,200 Computers and Still Infecting a Lot More

Tajammul Pangarkar
Tajammul Pangarkar

Updated · Feb 26, 2019

SHARE:

Scoop.market.us is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more.
close
Advertiser Disclosure

At Market.us Scoop, we strive to bring you the most accurate and up-to-date information by utilizing a variety of resources, including paid and free sources, primary research, and phone interviews. Our data is available to the public free of charge, and we encourage you to use it to inform your personal or business decisions. If you choose to republish our data on your own website, we simply ask that you provide a proper citation or link back to the respective page on Market.us Scoop. We appreciate your support and look forward to continuing to provide valuable insights for our audience.

Malware programs are dangerous as they can perform a lot of tasks like Stealing sensitive information along with the passwords and other information. Security researchers today warned that Credential-theft malware had infected thousands of computers and stolen confidential information from those computers. Also, the same malware is still making its way to infect more computers. The name of this credential stealing malware is Separ, which exists from late 2017 but has started the attack from the last few weeks.

Security analysts at the firm Deep instincts reported that the virus was dormant from its inception, but has returned with the newer version, which is on the mission to infect multiple computers. As of now, it has infected more than 1,200 computers, and the number is increasing day by day. One exciting thing that security analysts found about this malware is that it is tough to detect. Most of the anti-malware software programs are unable to identify it due to the working method that is not like the usual malware program. The malware utilizes the “Living off the Land” method that involves the short scripts and executing legit commands. The software runs inside the legit software programs that are currently running in the computer, and that is why the anti-malware software is useless to detect this.

The newer version of this software comes with a PDF document. When a user opens the document, the malware is activated, and it starts to execute the commands to collect and send the credentials to the central server. As the analysts have analyzed the primary server where the data is being stored, they’ve concluded that more than 1,200 computers have sent the data to the server. The number is increasing day by day, and that is one of the reasons for worrying.

SHARE:
Tajammul Pangarkar

Tajammul Pangarkar

Tajammul Pangarkar is a CMO at Prudour Pvt Ltd. Tajammul longstanding experience in the fields of mobile technology and industry research is often reflected in his insightful body of work. His interest lies in understanding tech trends, dissecting mobile applications, and raising general awareness of technical know-how. He frequently contributes to numerous industry-specific magazines and forums. When he’s not ruminating about various happenings in the tech world, he can usually be found indulging in his next favorite interest - table tennis.