{"id":153669,"date":"2022-12-26T21:31:42","date_gmt":"2022-12-27T03:31:42","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2022\/12\/new-info-stealer-malware-infects-software-pirates-via-fake-cracks-sites"},"modified":"2022-12-26T21:31:42","modified_gmt":"2022-12-27T03:31:42","slug":"new-info-stealer-malware-infects-software-pirates-via-fake-cracks-sites","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2022\/12\/new-info-stealer-malware-infects-software-pirates-via-fake-cracks-sites","title":{"rendered":"New info-stealer malware infects software pirates via fake cracks sites"},"content":{"rendered":"<p style=\"padding-right: 20px\"><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/new-info-stealer-malware-infects-software-pirates-via-fake-cracks-sites3.jpg\"><\/a><\/p>\n<p>A new information-stealing malware named \u2018RisePro\u2019 is being distributed through fake cracks sites operated by the PrivateLoader pay-per-install (PPI) malware distribution service.<\/p>\n<p>RisePro is designed to help attackers steal victims\u2019 credit cards, passwords, and crypto wallets from infected devices.<\/p>\n<p>The malware was spotted by analysts at <a href=\"https:\/\/flashpoint.io\/blog\/risepro-stealer-and-pay-per-install-malware-privateloader\/\" target=\"_blank\" rel=\"nofollow noopener\">Flashpoint<\/a> and <a href=\"https:\/\/blog.sekoia.io\/new-risepro-stealer-distributed-by-the-prominent-privateloader\/\" target=\"_blank\" rel=\"nofollow noopener\">Sekoia<\/a> this week, with both cybersecurity firms confirming that RisePro is a previously undocumented information stealer now being distributed via fake software cracks and key generators.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A new information-stealing malware named \u2018RisePro\u2019 is being distributed through fake cracks sites operated by the PrivateLoader pay-per-install (PPI) malware distribution service. RisePro is designed to help attackers steal victims\u2019 credit cards, passwords, and crypto wallets from infected devices. The malware was spotted by analysts at Flashpoint and Sekoia this week, with both cybersecurity firms [\u2026]<\/p>\n","protected":false},"author":427,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34],"tags":[],"class_list":["post-153669","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/153669","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/427"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=153669"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/153669\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=153669"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=153669"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=153669"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}