Jupyter infostealer malware is stealing Chrome and Firefox data
New information stealer malware dubbed as Jupyter is targeting web browser data.
Jupyter is an infostealer malware which is operated by Russian hackers. Infostealer malware is used by hackers to steal sensitive information from the targeted system. The malware connects to its server and uploads the stolen data, which can later be used by hackers.
Researchers have found that Jupyter is written in .NET and targets notable web browsers such as Mozilla Firefox and Google Chrome. The malware has the capability of downloading and running malware plus Powershell scripts and commands while also injecting shellcode.
The malware file appears to be an authentic installation file in ZIP format. The alarming situation is that the malware has a detection rate of 0% in six months, which means that there are plenty of devices under undetected attacks.
Researchers have conducted research operations on this malware and its C2 servers. The command servers are present in the Russian region and many of them are inactive as suggested by the latest reports.
NPAV recommends users to always use authentic and genuine websites for downloading files. Using an untrusted source for downloading can bombard your device with malware. Users must properly check the authenticity of every downloaded file as they may contain hidden malicious elements.
Install NPAV on your devices to keep them protected from all kinds of cyberattacks. Use NPAV and join us on a mission to secure the cyber world.
- Other (42)
- Ransomware (123)
- Events and News (26)
- Features (44)
- Security (422)
- Tips (79)
- Google (22)
- Achievements (8)
- Products (33)
- Activation (7)
- Dealers (1)
- Bank Phishing (42)
- Malware Alerts (187)
- Cyber Attack (219)
- Data Backup (11)
- Data Breach (75)
- Phishing (138)
- Securty Tips (1)
- Browser Hijack (16)
- Adware (15)
- Email And Password (67)
- Android Security (55)
- Knoweldgebase (38)
- Botnet (15)
- Updates (3)
- Alert (70)
- Hacking (57)
- Social Media (7)
- vulnerability (53)
- Hacker (31)
- Spyware (8)
- Windows (6)
- Microsoft (21)
- Uber (1)
- YouTube (1)
- Trojan (2)
- Website hacks (3)
- Paytm (1)
- Credit card scam (1)
- Telegram (3)
- RAT (5)
- Bug (3)
- Twitter (2)
- Facebook (7)
- Banking Trojan (5)
- Mozilla (2)
- COVID-19 (5)
- Instagram (2)
- NPAV Announcement (5)
- IoT Security (1)
- Deals and Offers (1)
- Cloud Security (8)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (2)
- WhatsApp (4)
- Amazon (1)
- DMart (1)
- Payment Risk (4)
- Occasion (2)
- firewall (1)
- Cloud malware (2)
- Cloud storage (2)
- Financial fraud (4)
- Impersonation phishing (1)
- DDoS (4)
- Smishing (2)
- Whale (0)
- Whale phishing (3)
- WINRAR (2)
- ZIP (2)