This Computer Malware Steals Your Information
ฝัง
- เผยแพร่เมื่อ 29 ม.ค. 2024
- jh.live/flare || You can manage threat intelligence and track down stealer logs for your own organization with Flare! Try a free trial and see what info is out there: jh.live/flare
Free Cybersecurity Education and Ethical Hacking with John Hammond
🔥TH-cam ALGORITHM ➡ Like, Comment, & Subscribe!
🙏SUPPORT THE CHANNEL ➡ jh.live/patreon
🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor
🌎FOLLOW ME EVERYWHERE ➡ jh.live/discord ↔ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/instagram ↔ jh.live/tiktok
💥 SEND ME MALWARE ➡ jh.live/malware
Flare doesn't post any pricing on their website because it's insanely expensive.
Hudson Rock are way cheaper..
"A large country that doesn't arrest cyber criminals."
Well. We all know what country it is and you don't have to censor the name. It's Russia.
china no ?
@@Shock-oh5rc
China doesn't seem to really like the idea to have criminals operating beyond CCP's control. Most of the Chinese malware targeting oversea orgs are made by PLA units of CCP. If you look at dark market goods, the pattern becomes much more clear. Almost all the top dogs are run by Russians. E.g. Redline, Lumma, FormBook/XLoader/GuLoader, (likely) the updated Raccoon, Snake keylogger (the dotNET one, not the infamous FSB backdoor), etc. Other common stealers, e.g. Remcos and AgentTesla, did not originate from China, either. Chinese ones are mostly private APT frameworks instead of some dark market MaaS.
as long as they don't hack Russians...
Thank you, love your videos.
This one is way over my knowledge.
How does those virus works with keyscrambler?
Vidar and lesser-known stealers pose risks, overshadowed by widespread threats. Bentley's TV absence contrasts Suzuki's visibility. 🌐🛡
It still surprises me even in 2024 how simple a lot of these infection methods are, but that they are still so successful. Clicking a fishy link that ends up in a fishier login request. Email with a poisoned docx file. Cards stolen from services where there is no reason to leave a payment method attached. Letting your browser save all your login info without a second thought. There is no perfect system or defense but you can at least cover many low-hanging access options with a bit of vigilance, awareness and maybe a defensive add-on or two.
Well said
Been wrecking my head who that guy reminds me of. Seth MacFarlane.
even the stealer steal between themself in this ecosystem,
Awesome, John! I was always wanting to take a peek of the backend of infostealers.
What?! Malware that steals my information? That's definitely title-worthy. Never been done before.
Awesome as always John! Appreciate your content, thank you for sharing.
so they need to make browser more secure !
12:28 yup we know and were not proud of it either
Thank you :)
04:00 That Quake 4? Carcinogensda is doing a playthrough of that now. What a coincidence!
subscribed earned.
Interesting....🤔
This car drives.
wassup yo!!
love your videos ❤
My personal recommendation is don't install it.
racoon stealer is still there
Username 'racoon' rules Redline crack version
what a diss
Nice ad you freak
Redline isn't even one of the most powerful ones
Its quite old but he is right it is common
Because its very general
@@lootclan5842 yeah he is, just stating it
Give us some examples of what you think is powerful
@@IncontenentiaButtux recent updates to windows have made it impossible to run redline stealer anymore. The commandlines that you should run before the panel sometimes fail to start and even if they do the login panel no longer shows up no matter how much you try to run the exe
@@fastcode8664 That's good to know. I have a follow up question if you perhaps have the time to answer it. If someone got hit by redline about two years ago but they didn't realise it until this year how bad are the implications if there was no online banking on the infected device, all important passwords and 2fa have been changed, the device has been wiped, and there has seemingly been no hijacking attempts made on accounts that were synced on said device since the infection happened. Any recommendations? Trying to help out a client as they have been quite panicked since being informed of the infection from their digital footprint but I'm unfortunately not that familiar with infostealers and how deep they go. Thanks by the way, hope that you have a good day.
bros elon musk
Welcome to jurrassic park
Lumma stealer is better
Cool 😊
Their expertise in mobile security has resolved many issues for us. Adrian Ruthnik is the go-to for effective solutions, providing comprehensive security measures for our mobile devices.
Adrian Ruthnik's proactive approach to cybersecurity has fortified our defenses against potential attacks. Their expertise and dedication have been invaluable to our security strategy.
Their professionalism and ethical approach to hacking services are what set Adrian Ruthnik apart from others. They deliver reliable and effective security solutions without compromising ethics.
How to create Malware in C programming
how to create Ransomware in C programming
@@ZeusSec-gi1bq still searching on this topic.
@@MuhammadJamil-ho6wlwhy do you need it. I would have taught you. But it seems like you might use it maliciously😊
Did you mistake YT Comments with ChatGPT?
@@ThisIsJustADrillBit 😂
Thank you for your time 😘😘🥰😘🥰😘🥰😘🥰😘🥰😘🥰😘🥰😘🥰😘🥰😘🥰😘🥰😘🥰😘🥰😘🥰😘🥰😘🥰😘🥰😘🥰😘🥰😘🥰😘🥰