Automatic SextMation Spy Watch Webcam Photos Watch Victims to Watch Porn
SextMation -based hacking, which The webcam has kidnapped a victim or blacklifting them with the insults they are deceived or shared, showing one of the most disturbing forms of cybercrime. Now one of the extensive spy examples available to this relatively manual mass has made it an automatic feature, and recognizes that the user is browsing pornography on their PC, imaging it, and taking an explicit photo of the victim through the webcam.
On Wednesday, Researchers at the ProofPoint Security Company released their analysis of an open source of the “Infostealer” malware known as Stealerium, which the company has used in several cyber campaigns since May this year. The malware, like all Infosalers, is designed to infect a computer and automatically sends the hacker to a wide range of stolen sensitive data, including banking information, usernames and passwords and crying wallet keys. However, Stealerium adds another and more humiliating form of espionage: the browser also monitors the victim’s browser for web addresses, including NSFW keywords, images browser pages that include words, while watching those porn pages, sending the victim through their webcam, and sending them to their webcam.
“When it comes to InfStealers, they are typically looking for anything they can do,” says Selena Larson, a proofpoint researcher who worked on the company’s analysis. “This adds another layer of privacy invasion and sensitive information that you definitely do not want to be in the hands of a particular hacker.”
Larson adds, “This is gross.” “I hate it.”
Proofpoint was dug to Presserium features after finding malware in tens of thousands of emails sent by two different hacker groups (both relatively small -scale offenders), as well as a number of other email hacking campaigns. Stealerium, strangely, is distributed as a free open source tool in GitHub. The developer of the malware, named by Witchfindrr, described himself as a “malware analyst” in London, stated on this page that the program was “only educational goals”.
The page reads: “How to use this app is your responsibility.” “I will not be accountable for any illegal activity,” he said. How do I use it. “
In the Hacking ProofPoint campaigns, cybercriminals tried to deceive users in loading and installing Stealerium as an attachment or linking of the web and deceiving the victims with ordinary prey such as fake payment or invoice. These emails targeted victims in the hospitality industry as well as in education and finance, although Proofpoint points out that outside companies are likely to be targeted, but are not seen by its supervision tools.
After installation, Stealerium is sent to the hacker to steal a wide range of data and send it through services such as Telegram, Discord or SMTP protocol in some types of espionage, all of which are relatively standard in Infosalers. Researchers were amazed at seeing the automatic SextMation feature, which monitors browser URLs for a list of pornographic terms such as “sex” and “porn”, which could be customized by the hacker and created the simultaneous image through the web and user browser. Proofpoint points out that no specific victims have specified the performance of that function, but indicates that this feature means using it.