Security News > 2022 > May > Shopping for malware: $260 gets you a password stealer. $90 for a crypto-miner...

According to researchers at cyber-intelligence outfit Cyble, the Eternity site's operators also have a channel on Telegram, where they provide videos detailing features and functions of the Windows malware.
Once someone decides to purchase of one or more of Eternity's malware components, they have the option to customize the final binary executable for whatever crimes they want to commit.
"Interestingly, individuals who purchase the malware can utilize the Telegram Bot to build the binary," the researchers wrote.
Malware sales and subscriptions are alive and well in the cybercriminal world, with popular malware types - from ransomware to DDoS and phishing programs, as illustrated by the detection of the Frappo phishing-as-a-service tool late last month - being peddled by developers.
The list of malware that can be bought from the Eternity Project is extensive.
"While it's new that you can use a Telegram bot to build or acquire commodity malware, it is just the latest path to market for commodity and low-end malware for the script kiddie crowd. From the prices they are charging, I wouldn't expect to see this often in enterprise attacks, but certainly attacks against consumers and SMBs who lack the tools to protect themselves from even basic threats would be the most frequent victims of these tools." .
News URL
https://go.theregister.com/feed/www.theregister.com/2022/05/14/eternity-project-malware-sale/
Related news
- Fake CrowdStrike job offer emails target devs with crypto miners (source)
- Hackers Exploit Aviatrix Controller Vulnerability to Deploy Backdoors and Crypto Miners (source)
- Crazy Evil Gang Targets Crypto with StealC, AMOS, and Angel Drainer Malware (source)
- Crypto-stealing iOS, Android malware found on App Store, Google Play (source)
- SparkCat Malware Uses OCR to Extract Crypto Wallet Recovery Phrases from Images (source)
- Week in review: Exploited 7-Zip 0-day flaw, crypto-stealing malware found on App Store, Google Play (source)
- Microsoft spots XCSSET macOS malware variant used for crypto theft (source)
- GrassCall malware campaign drains crypto wallets via fake job interviews (source)