A few years ago, the Racoon Stealer malware disguised itself as a service platform. This platform started to gain notoriety due to its ability to extract sensitive data stored within a web browser.
The data extracted often included cookies, passwords, etc. The extraction of such data is hazardous because it can allow a device to be authenticated without inputting any passwords.
Racoon Stealer could also steal auto-filled data, including personal information such as home address, basic contact information, and even credit card numbers. Furthermore, Racoon stealer was also apt at stealing cryptocurrency and stealing files saved on an infected system.
Therefore, this malware was extremely powerful and could wreak havoc on organizations. However, the developers of Racoon Stealer have recently created a new version that may be more damaging than the previous version.
This new version of the Racoon Stealer still retains its old capabilities of stealing cookies, browser passwords, auto-fill data, and credit card numbers. However, now it is far better at stealing cryptocurrency. Alongside attacking cryptocurrency wallets, it can directly also attack cryptocurrency-related browser plugins.
The malware has now been enhanced. It now has the ability to steal and harvest files regardless of where they are saved. Thus, it currently does not matter which disk they reside in, and Racoon Stealer can quickly get to them.
It now also has the ability to get a list of all the applications installed on a computer. This information can allow the attacker to know whether or not a particular device has information that is worth stealing.
Furthermore, Racoon Stealer can also capture screenshots from the system it has infected. These screenshots can be used for countless nefarious purposes. They can also be used to extract information not saved on the computer but entered temporarily.
Therefore, all your sensitive information is at the attacker’s mercy if the malware enters your device. It can be used as the basis for a cyber extortion scheme.