Raccoon stealer is a Malware as a service (MaaS) launched in 2019, some functionality of the raccoon stealer is to grab cookies, stored passwords, auto-fill data and cryptocurrency wallet data, the operations of the raccoon stealer were suspended after the death of a major developer during the Russia-Ukraine war.
In June 2022, many malware researchers identified the emergence of raccoon stealer 2.0 as it was found to be sold via telegram, its functionality was found to be like its predecessor, it was advertised as it has the capability of a loader and stealer.
Some of the targeted applications of Raccoon stealer 2.0 are mail applications such as outlook and thunderbird, and browsers such as Microsoft Edge, Chrome, and Firefox.
Some of the known delivery methods of raccoon stealer 2.0 are delivered through emails and files.
The Raccoon stealer was also identified to be distributed through fake installers and cracked version of the software.
- Be aware of phishing emails, and never open emails, or files from an untrusted source, if the context of mail is important and suspicious, reach the IT security team of your organization.
- Never download software from an untrusted source.
- Organizations must define the detection rule, based on the signature of the Raccoon stealer in the defensive applications.
IOCs (Indicators of Compromise) for Raccoon Stealer 2.0