Security News > 2021 > August > Malware dev infects own PC and data ends up on intel platform
A malware developer unleashed their creation on their system to try out new features and the data ended up on a cybercrime intelligence platform, exposing a glimpse of the cybercriminal endeavor.
The threat actor is the developer of Raccoon, an information stealer that can collect data from dozens of applications and has been growing in popularity for the past two years.
While testing a variant of the stealer, the developer of Raccoon infected their own system, a move that immediately triggered the data to flow to the command and control server and further on, to cybercrime forums.
The data collected from the self-infected system shows that the developer tested the malware's ability to extract passwords from Google Chrome, an essential attribute for any information stealer.
Additional information trawled from the Raccoon test computer revealed a name and multiple email addresses associated with the malware.
While the information collected this way does not contain the hints necessary to put a real name to Raccoon's developer, it shows that cybercriminals can also slip up and there is still hope to catch them off guard.