Skip to content

MSN Technology

Tech Solutions for a Smarter World

Menu
  • About MSN Technology
  • Contact Us
  • Write for Us
Menu
security lock computer cyber 1152x648

Authorities carry out global takedown of infostealer used by cybercriminals

Posted on May 22, 2025

security lock computer cyber

“Based on what we are seeing, there is a wide range of cybercriminals that acknowledged that they are using Loma, such as credit card fraud, early access sale, cryptocurrency theft, and more.”

In other tools, scattered spider hacking group – which has attacked Caesar Entertainment, MGM Resorts International, and other victims. Seen using Luma theft. Meanwhile, according to a report TakkarchLuma Milware was allegedly used in the construction of a Hack of Education Tech Firm Power School of December 2024, which 70 million records were stolen.

“Now we are seeing that infoastillers are not only technically prepared, but also play a more central role,” says Well’s Wardley. “Even the actors of the national state are developing and deploying them.”

Ian Gray, director of analysis and research at the security firm Flash Point, says that while infoastillers are the only tools that will use cybercriminals, but their spread can facilitate cybercriminals to hide their tracks. Gray says, “Even advanced risk actor groups are taking advantage of infoastiler logs, or they are at risk of burning sophisticated strategies, techniques and procedures (TTP).”

Luma is not the first infoastler to target law enforcement agencies. In October last year, the Dutch National Police, along with international partners, took down the infrastructure affiliated with the Red Line and Metastler malware, and the US Department of Justice accused them. Maxim OrlenitesOne of the alleged developers and organizers of the Red Line Infoastler.

Despite the international crackdown, infoastilers have been very useful and effective in abandoning the invaders. As the Gray of the Flash Point has said, “Even if the defense of the landscape eventually changes due to the evolution of defense, the growing importance of infoastilers over the past few years shows that they are likely to stay here for the future. Their use has exploded.”

This story originally appeared Wired dot.

Source link

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • Musk’s DOGE used Meta’s Llama 2—not Grok—for gov’t slashing, report says
  • Gouach wants you to insert and pluck the cells from its Infinite e-bike battery
  • Destructive malware available in NPM repo went unnoticed for 2 years
  • New data confirms: There really is a planet squeezed in between two stars
  • Gazelle Medeo T9 City e-bike review: Steady as she goes

Recent Comments

  1. How to Make a Smart Kitchen: The Ultimate Guide - INSCMagazine on Top Smart Cooking Appliances in 2025: Revolutionizing Your Kitchen
  2. Top Smart Cooking Appliances in 2025: Revolutionizing Your Kitchen – MSN Technology on Can I Control Smart Cooking Appliances with My Smartphone?
  3. Venn Alternatives for Remote Work: Enhancing Productivity and Collaboration – MSN Technology on Top 9 AI Tools for Data Analytics in 2025
  4. 10 Small Business Trends for 2025 – MSN Technology on How To Extending Your Business Trip for Personal Enjoyment: A Guide

Archives

  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024

Categories

  • Business
  • Education
  • Fashion
  • Home Improvements
  • Sports
  • Technology
  • Travel
  • Uncategorized
©2025 MSN Technology | Design: Newspaperly WordPress Theme
Go to mobile version