"##alers are malware designed to gather sensitive data from infected systems and send it back to the attacker. typical targets for infostealers are credentials used in online services, cryptocurrency wallets, and files that may be of interest. figure 1 : screenshot of jai ’ s post…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1589.001Credentials
43%
"the ultimate validation : making a hacker ’ s “ do not engage ” list validation can come from the most unexpected places — like malware code. meet celestial stealer, a sneaky infostealer malware designed to swipe sensitive information. but when it spots a suspicious name, it hits…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1657Financial Theft
35%
"to trellix security researchers, javascript infostealers like celestial stealer use advanced obfuscation techniques and can be disguised as standalone electron or nodejs applications. threat actors know they must constantly pivot and change technical evasion tactics to stay in bu…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1003OS Credential Dumping
33%
"to trellix security researchers, javascript infostealers like celestial stealer use advanced obfuscation techniques and can be disguised as standalone electron or nodejs applications. threat actors know they must constantly pivot and change technical evasion tactics to stay in bu…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
When Celestial Stealer runs in the wild, it looks for Huntress’ own Jai Minton as a potential threat, and this shuts down the infostealer operation if his name is detected.