{"id":145690,"date":"2022-09-05T21:24:08","date_gmt":"2022-09-06T02:24:08","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2022\/09\/prynt-stealer-contains-a-backdoor-to-steal-victims-data-stolen"},"modified":"2022-09-05T21:24:08","modified_gmt":"2022-09-06T02:24:08","slug":"prynt-stealer-contains-a-backdoor-to-steal-victims-data-stolen","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2022\/09\/prynt-stealer-contains-a-backdoor-to-steal-victims-data-stolen","title":{"rendered":"Prynt Stealer Contains a Backdoor to Steal Victims\u2019 Data Stolen"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/prynt-stealer-contains-a-backdoor-to-steal-victims-data-stolen.jpg\"><\/a><\/p>\n<p>Researchers discovered a private Telegram channel-based backdoor in the information stealing malware, dubbed <b>Prynt Stealer<\/b>, which its developer added with the intention of secretly stealing a copy of victims\u2019 exfiltrated data when used by other cybercriminals.<\/p>\n<p>\u201cWhile this untrustworthy behavior is nothing new in the world of cybercrime, the victims\u2019 data end up in the hands of multiple threat actors, increasing the risks of one or more large scale attacks to follow,\u201d Zscaler ThreatLabz researchers Atinderpal Singh and Brett Stone-Gross <a href=\"https:\/\/www.zscaler.com\/blogs\/security-research\/no-honor-among-thieves-prynt-stealers-backdoor-exposed\" rel=\"noopener\" target=\"_blank\">said<\/a> in a new report.<\/p>\n<p>Prynt Stealer, which <a href=\"https:\/\/thehackernews.com\/2022\/05\/experts-detail-saintstealer-and-prynt.html\" rel=\"noopener\" target=\"_blank\">came to light<\/a> earlier this April, comes with capabilities to log keystrokes, steal credentials from web browsers, and siphon data from Discord and Telegram. It\u2019s sold for $100 for a one-month license and $900 for a lifetime subscription.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Researchers discovered a private Telegram channel-based backdoor in the information stealing malware, dubbed Prynt Stealer, which its developer added with the intention of secretly stealing a copy of victims\u2019 exfiltrated data when used by other cybercriminals. \u201cWhile this untrustworthy behavior is nothing new in the world of cybercrime, the victims\u2019 data end up in the [\u2026]<\/p>\n","protected":false},"author":427,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34],"tags":[],"class_list":["post-145690","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/145690","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/427"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=145690"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/145690\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=145690"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=145690"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=145690"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}