Regardless of the protections to be implemented, the people, the wait is often used to distribute malware. The thousands of comments that have been identified recently in GitHub with a link to the files to the external, which is supposed to fix the issues found in the code. In reality, the victim is unsuspecting installed famëkeqin Lumma Stealer is the one who can steal a large amount of information to be sensitive.
Be aware of the corrections in the wrong, in the comments
The risk was initially discovered by a user, who contribute to the project, teloxide, a framework for Rust that allows you to create your bot Telegram. The developer has taken the last 5 commentary in the guidelines that must be followed for installation of a control. Bleeping Computer then identifies the thousands of comments that related to other projects as well.
To an engineer, the opposite of that found on the 29,000 comments in 3 days. In the text, there is a link to the regulation, claiming to be distributed via MediaFire or Over.ly. This is an archive is password protected (indicated in the comments). By clicking on the link to download the file fix.zip that includes three of the DLL and the executable file. It installs the Lumma Stealer.
This is some of the information with the thief, the more dangerous the surrounding. It can steal passwords, cookies, numbers, cards, credit history from Chrome, Edge, and Firefox, the files, the text, and the PDF files, keys, and private and kuleta the kriptomonedhave. The data is stored in a storing it on your computer, and then sent back to the server in the distance. Cyber criminals cyber able to use them for the crimes of the latter, or to sell it in the dark.
The staff of the GitHub took all of the feedback and reported, but it has some of the victims. In this case, it is necessary to change the passwords of all the accounts, and the move immediately kriptovalutat in-one wallet to another.
Discussion about this post