How are stealer logs stolen?
by - Thursday, January 1, 1970 at 12:00 AM
Hi I'm just curious about how logs like the ones on genesis are captured. Id love to make a program that does the same sorta thing as they do for a project and my initial research has left me quite confused as you cant just steal password out of chromes password for example due to it being encrypted and im struggling to find anymore information on the topics. Method of extraction and the most efficient programming language (I'm very good at python however ive realised its not really well suited for this type of use case)
Reply
Usually victims install chrome malicious extension this the very common approach they may be others
Reply
(October 20, 2022, 06:51 PM)japanvps0 Wrote: Usually victims install chrome malicious extension this the very common approach they may be others


I don't think the extension has the priviliges to get your data that is outside chrome itself
Reply
(October 21, 2022, 05:54 PM)denisee3 Wrote:
(October 20, 2022, 06:51 PM)japanvps0 Wrote: Usually victims install chrome malicious extension this the very common approach they may be others


I don't think the extension has the priviliges to get your data that is outside chrome itself


usually something like redline stealer or other malware that can decrypt the login/cookie files from the AppData folder and upload it somehow.
Reply


 Users viewing this thread: How are stealer logs stolen?: No users currently viewing.