#credentialstealer — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #credentialstealer, aggregated by home.social.
-
#SupplyChain-Angriff auf #TanStack: 42 Pakete kompromittiert | Developer https://www.heise.de/news/Supply-Chain-Angriff-auf-TanStack-42-Pakete-kompromittiert-11290715.html #npm #MiniShaiHulud #Patchday #CredentialStealer
-
#SupplyChain-Angriff auf #TanStack: 42 Pakete kompromittiert | Developer https://www.heise.de/news/Supply-Chain-Angriff-auf-TanStack-42-Pakete-kompromittiert-11290715.html #npm #MiniShaiHulud #Patchday #CredentialStealer
-
#SupplyChain-Angriff auf #TanStack: 42 Pakete kompromittiert | Developer https://www.heise.de/news/Supply-Chain-Angriff-auf-TanStack-42-Pakete-kompromittiert-11290715.html #npm #MiniShaiHulud #Patchday #CredentialStealer
-
#SupplyChain-Angriff auf #TanStack: 42 Pakete kompromittiert | Developer https://www.heise.de/news/Supply-Chain-Angriff-auf-TanStack-42-Pakete-kompromittiert-11290715.html #npm #MiniShaiHulud #Patchday #CredentialStealer
-
Oh no. Here we go again! Another wave of compromised #npm packages. Check your dependencies! This time it even deletes your home directory, if it does not find any secrets 😱
https://www.aikido.dev/blog/shai-hulud-strikes-again-hitting-zapier-ensdomains
And it appears that the worm is quite successful again: https://github.com/search?q=sha1-hulud&type=repositories
#ShaiHulud #Malware #CredentialStealer #SupplyChain #SupplyChainAttack #InfoSec
-
Here’s how potent Atomic credential stealer is finding its way onto Macs - Ads prominently displayed on search engines are impersonatin... - https://arstechnica.com/security/2025/09/potent-atomic-credential-stealer-can-bypass-gatekeeper/ #credentialstealer #malvertising #security #biz #atomic #apple #macos #amos
-
Rhadamanthys Stealer has it's own web, I had missed that completely.
Yet another sign that the Stealer market is growing, maturing and getting increasingly professional and an important part of the ecosystem.
-
Any thoughts on how many Credential Stealer families rely on using the Telegram API Bot endpoint for exfiltrating / copying information from infected devices?
Trying to assess the potential for leveraging that observation for some simple detection rules of potential stealer infections.
Any hot takes?