Security News > 2022 > May > Experts Detail Saintstealer and Prynt Stealer Info-Stealing Malware Families

Experts Detail Saintstealer and Prynt Stealer Info-Stealing Malware Families
2022-05-10 05:44

"After execution, the stealer extracts username, passwords, credit card details, etc.," Cyble researchers said in an analysis last week.

"The stealer also steals data from various locations across the system and compresses it in a password-protected ZIP file."

What's more, the IP address linked to the C2 domain - 141.8.197[.]42 - is tied to multiple stealer families such as Nixscare stealer, BloodyStealer, QuasarRAT, Predator stealer, and EchelonStealer.

"If even unsophisticated stealers like Saintstealer gain infrastructural access, it could have devastating effects on the cyberinfrastructure of the targeted organization."

The disclosure comes as a new infostealer named Prynt Stealer has surfaced in the wild that can also perform keylogging operations and financial theft using a clipper module.

Sold for $100 for a one-month license and $900 for a lifetime subscription, the malware joins a long list of other recently advertised stealers, including Jester, BlackGuard, Mars Stealer, META, FFDroider, and Lightning Stealer.


News URL

https://thehackernews.com/2022/05/experts-detail-saintstealer-and-prynt.html