Data Security, Identity, MSP

ACRStealer Malware Targets Google Docs for Command-and-Control

A glowing privacy policy document with digital padlocks surround

Information-stealing malware ACRStealer added Google Docs as a means for covert command-and-control communications, reports Cybernews.

ACRStealer followed the lead of the LummaC2 infostealer in leveraging legitimate platforms to facilitate its distribution, Cybernews said.

Attacks involved the retrieval and decoding of the legitimate C2 domain in base64, enabling ACRStealer to exfiltrate browser data, FTP credentials, text files, emails, chat logs, remote access program information, password manager details, VPN data, browser extension information, and database details, according to findings from AhnLab Security Intelligence Center researchers.

Other services ACRStealer uses for intermediary C2 include Steam and telegra.ph. The development comes after a Hudson Rock report detailing infostealer attacks against the U.S. military and defense sector, impacting more than 500 employees from major defense and aerospace contractors Honeywell, Boeing, Lockheed Martin, and Leidos, and hundreds of other Army and Navy computers.

Palo Alto Networks Unit 42 noted that infostealers are the leading threat faced by macOS devices.

An In-Depth Guide to Identity

Get essential knowledge and practical strategies to fortify your identity security.

You can skip this ad in 5 seconds

Cookies

This website uses cookies to improve your experience, provide social media features and deliver advertising offers that are relevant to you.

If you continue without changing your settings, you consent to our use of cookies in accordance with our privacy policy. You may disable cookies.