This Computer Malware Steals Your Information

แชร์
ฝัง
  • เผยแพร่เมื่อ 29 ม.ค. 2024
  • jh.live/flare || You can manage threat intelligence and track down stealer logs for your own organization with Flare! Try a free trial and see what info is out there: jh.live/flare
    Free Cybersecurity Education and Ethical Hacking with John Hammond
    🔥TH-cam ALGORITHM ➡ Like, Comment, & Subscribe!
    🙏SUPPORT THE CHANNEL ➡ jh.live/patreon
    🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor
    🌎FOLLOW ME EVERYWHERE ➡ jh.live/discord ↔ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/instagram ↔ jh.live/tiktok
    💥 SEND ME MALWARE ➡ jh.live/malware

ความคิดเห็น • 69

  • @paul.phillips
    @paul.phillips 5 หลายเดือนก่อน +24

    Flare doesn't post any pricing on their website because it's insanely expensive.

    • @comfynation1119
      @comfynation1119 5 หลายเดือนก่อน +1

      Hudson Rock are way cheaper..

  • @mu11668B
    @mu11668B 5 หลายเดือนก่อน +16

    "A large country that doesn't arrest cyber criminals."
    Well. We all know what country it is and you don't have to censor the name. It's Russia.

    • @Shock-oh5rc
      @Shock-oh5rc 5 หลายเดือนก่อน +3

      china no ?

    • @mu11668B
      @mu11668B 5 หลายเดือนก่อน

      @@Shock-oh5rc
      China doesn't seem to really like the idea to have criminals operating beyond CCP's control. Most of the Chinese malware targeting oversea orgs are made by PLA units of CCP. If you look at dark market goods, the pattern becomes much more clear. Almost all the top dogs are run by Russians. E.g. Redline, Lumma, FormBook/XLoader/GuLoader, (likely) the updated Raccoon, Snake keylogger (the dotNET one, not the infamous FSB backdoor), etc. Other common stealers, e.g. Remcos and AgentTesla, did not originate from China, either. Chinese ones are mostly private APT frameworks instead of some dark market MaaS.

    • @bonniesitessolutions7728
      @bonniesitessolutions7728 5 หลายเดือนก่อน +2

      as long as they don't hack Russians...

  • @twinkles5569
    @twinkles5569 5 หลายเดือนก่อน +2

    Thank you, love your videos.
    This one is way over my knowledge.

  • @ImNotAKingImNotAGodImWorse
    @ImNotAKingImNotAGodImWorse 5 หลายเดือนก่อน +1

    How does those virus works with keyscrambler?

  • @hehefer
    @hehefer 5 หลายเดือนก่อน

    Vidar and lesser-known stealers pose risks, overshadowed by widespread threats. Bentley's TV absence contrasts Suzuki's visibility. 🌐🛡

  • @rectalespionagesailboat4819
    @rectalespionagesailboat4819 5 หลายเดือนก่อน +1

    It still surprises me even in 2024 how simple a lot of these infection methods are, but that they are still so successful. Clicking a fishy link that ends up in a fishier login request. Email with a poisoned docx file. Cards stolen from services where there is no reason to leave a payment method attached. Letting your browser save all your login info without a second thought. There is no perfect system or defense but you can at least cover many low-hanging access options with a bit of vigilance, awareness and maybe a defensive add-on or two.

    • @Maxxz101
      @Maxxz101 16 วันที่ผ่านมา

      Well said

  • @dkierans
    @dkierans 5 หลายเดือนก่อน

    Been wrecking my head who that guy reminds me of. Seth MacFarlane.

  • @hehefer
    @hehefer 5 หลายเดือนก่อน

    even the stealer steal between themself in this ecosystem,

  • @_secret-star
    @_secret-star 5 หลายเดือนก่อน +4

    Awesome, John! I was always wanting to take a peek of the backend of infostealers.

  • @Tosslehoffe
    @Tosslehoffe 2 หลายเดือนก่อน +2

    What?! Malware that steals my information? That's definitely title-worthy. Never been done before.

  • @user-hn8mr6yk8p
    @user-hn8mr6yk8p 5 หลายเดือนก่อน +1

    Awesome as always John! Appreciate your content, thank you for sharing.

  • @obaidullahnoori7066
    @obaidullahnoori7066 5 หลายเดือนก่อน

    so they need to make browser more secure !

  • @analyticphil8621
    @analyticphil8621 5 หลายเดือนก่อน

    12:28 yup we know and were not proud of it either

  • @war-c0mmander
    @war-c0mmander 5 หลายเดือนก่อน

    Thank you :)

  • @danielja1832
    @danielja1832 5 หลายเดือนก่อน +1

    04:00 That Quake 4? Carcinogensda is doing a playthrough of that now. What a coincidence!

  • @xportal9169
    @xportal9169 5 หลายเดือนก่อน

    subscribed earned.

  • @gamereditor59ner22
    @gamereditor59ner22 5 หลายเดือนก่อน

    Interesting....🤔

  • @user-it8yh8tu7d
    @user-it8yh8tu7d 5 หลายเดือนก่อน

    This car drives.

  • @x64_exploit0r
    @x64_exploit0r 5 หลายเดือนก่อน

    wassup yo!!

  • @muhammadtaha2578
    @muhammadtaha2578 5 หลายเดือนก่อน

    love your videos ❤

  • @SP2X1353
    @SP2X1353 3 หลายเดือนก่อน

    My personal recommendation is don't install it.

  • @adrian16ftw31
    @adrian16ftw31 5 หลายเดือนก่อน

    racoon stealer is still there

    • @hehefer
      @hehefer 5 หลายเดือนก่อน

      Username 'racoon' rules Redline crack version
      what a diss

  • @robertommmin5
    @robertommmin5 5 หลายเดือนก่อน +7

    Nice ad you freak

  • @SECYBERSAFE
    @SECYBERSAFE 5 หลายเดือนก่อน +18

    Redline isn't even one of the most powerful ones

    • @lootclan5842
      @lootclan5842 5 หลายเดือนก่อน +4

      Its quite old but he is right it is common
      Because its very general

    • @SECYBERSAFE
      @SECYBERSAFE 5 หลายเดือนก่อน

      @@lootclan5842 yeah he is, just stating it

    • @fastcode8664
      @fastcode8664 5 หลายเดือนก่อน +3

      Give us some examples of what you think is powerful

    • @fastcode8664
      @fastcode8664 2 หลายเดือนก่อน +1

      @@IncontenentiaButtux recent updates to windows have made it impossible to run redline stealer anymore. The commandlines that you should run before the panel sometimes fail to start and even if they do the login panel no longer shows up no matter how much you try to run the exe

    • @IncontenentiaButtux
      @IncontenentiaButtux 2 หลายเดือนก่อน

      @@fastcode8664 That's good to know. I have a follow up question if you perhaps have the time to answer it. If someone got hit by redline about two years ago but they didn't realise it until this year how bad are the implications if there was no online banking on the infected device, all important passwords and 2fa have been changed, the device has been wiped, and there has seemingly been no hijacking attempts made on accounts that were synced on said device since the infection happened. Any recommendations? Trying to help out a client as they have been quite panicked since being informed of the infection from their digital footprint but I'm unfortunately not that familiar with infostealers and how deep they go. Thanks by the way, hope that you have a good day.

  • @josefpetrik8730
    @josefpetrik8730 5 หลายเดือนก่อน +1

    bros elon musk

  • @Playeryt676
    @Playeryt676 5 หลายเดือนก่อน

    Welcome to jurrassic park

  • @thomaslium00
    @thomaslium00 5 หลายเดือนก่อน

    Lumma stealer is better

  • @si8963
    @si8963 5 หลายเดือนก่อน

    Cool 😊

  • @Hiteshbartade
    @Hiteshbartade 8 วันที่ผ่านมา

    Their expertise in mobile security has resolved many issues for us. Adrian Ruthnik is the go-to for effective solutions, providing comprehensive security measures for our mobile devices.

  • @rk.gamer9558
    @rk.gamer9558 8 วันที่ผ่านมา

    Adrian Ruthnik's proactive approach to cybersecurity has fortified our defenses against potential attacks. Their expertise and dedication have been invaluable to our security strategy.

  • @sarwanuikey534
    @sarwanuikey534 8 วันที่ผ่านมา

    Their professionalism and ethical approach to hacking services are what set Adrian Ruthnik apart from others. They deliver reliable and effective security solutions without compromising ethics.

  • @MuhammadJamil-ho6wl
    @MuhammadJamil-ho6wl 5 หลายเดือนก่อน +2

    How to create Malware in C programming

    • @ZeusSec-gi1bq
      @ZeusSec-gi1bq 5 หลายเดือนก่อน

      how to create Ransomware in C programming

    • @MuhammadJamil-ho6wl
      @MuhammadJamil-ho6wl 5 หลายเดือนก่อน

      @@ZeusSec-gi1bq still searching on this topic.

    • @SECYBERSAFE
      @SECYBERSAFE 5 หลายเดือนก่อน

      ​​@@MuhammadJamil-ho6wlwhy do you need it. I would have taught you. But it seems like you might use it maliciously😊

    • @ThisIsJustADrillBit
      @ThisIsJustADrillBit 5 หลายเดือนก่อน +1

      Did you mistake YT Comments with ChatGPT?

    • @SECYBERSAFE
      @SECYBERSAFE 5 หลายเดือนก่อน

      @@ThisIsJustADrillBit 😂

  • @S-Lomar
    @S-Lomar 5 หลายเดือนก่อน +1

    Thank you for your time 😘😘🥰😘🥰😘🥰😘🥰😘🥰😘🥰😘🥰😘🥰😘🥰😘🥰😘🥰😘🥰😘🥰😘🥰😘🥰😘🥰😘🥰😘🥰😘🥰😘🥰😘🥰