* . *
  • About
  • Advertise
  • Privacy & Policy
  • Contact
Thursday, September 18, 2025
Earth-News
  • Home
  • Business
  • Entertainment
    REO to return for UI homecoming – The News-Gazette

    REO Gears Up to Ignite the Stage at UI Homecoming Celebration!

    Gen V Season 2: What is The Odessa Project? – yahoo.com

    Gen V Season 2: Unlocking the Secrets of The Odessa Project

    PENN Entertainment stock rating reiterated at Market Outperform by JMP – Investing.com

    PENN Entertainment Stock Rated a Market Outperformer by Experts

    Here’s how NJ’s once-vibrant nightclub scene was born and why it died – Bergen Record

    The Rise and Fall of New Jersey’s Once-Vibrant Nightclub Scene: What Happened?

    The Emmys are back: Viewership soars to highest numbers in 4 years – yahoo.com

    The Emmys Return with a Bang: Viewership Hits a 4-Year High

    From Spinal Tap II to Ed Sheeran : your complete entertainment guide to the week ahead – The Guardian

  • General
  • Health
  • News

    Cracking the Code: Why China’s Economic Challenges Aren’t Shaking Markets, Unlike America’s” – Bloomberg

    Trump’s Narrow Window to Spread the Truth About Harris

    Trump’s Narrow Window to Spread the Truth About Harris

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Trending Tags

    • Trump Inauguration
    • United Stated
    • White House
    • Market Stories
    • Election Results
  • Science
  • Sports
  • Technology
    Bucking the Odds: Why Technology Companies Should Embrace Software Patents Today – Crowell & Moring LLP

    Bucking the Odds: Why Technology Companies Should Embrace Software Patents Today – Crowell & Moring LLP

    City IT presented Best of North Carolina Technology Award – RaleighNC.gov

    City IT Honored with Best of North Carolina Technology Award

    LELO Releases 2025 Futurist Report: Intergenerational Views on Relationships, Sex, and Technology – PR Newswire

    Exploring the Future: How Different Generations View Relationships, Sex, and Technology in 2025

    Will New Big Technology Engagements Reshape Innodata’s Growth Path? – Yahoo Finance

    Could New Major Tech Partnerships Propel Innodata to Unprecedented Growth?

    Unlocking AI Success: How People, Process, and Technology Form the Ultimate Triangle

    Billion-dollar coffins? New technology could make oceans transparent and Aukus submarines vulnerable – The Guardian

    Billion-Dollar Coffins? How New Technology Could Make Oceans Transparent and Expose Submarines

    Trending Tags

    • Nintendo Switch
    • CES 2017
    • Playstation 4 Pro
    • Mark Zuckerberg
No Result
View All Result
  • Home
  • Business
  • Entertainment
    REO to return for UI homecoming – The News-Gazette

    REO Gears Up to Ignite the Stage at UI Homecoming Celebration!

    Gen V Season 2: What is The Odessa Project? – yahoo.com

    Gen V Season 2: Unlocking the Secrets of The Odessa Project

    PENN Entertainment stock rating reiterated at Market Outperform by JMP – Investing.com

    PENN Entertainment Stock Rated a Market Outperformer by Experts

    Here’s how NJ’s once-vibrant nightclub scene was born and why it died – Bergen Record

    The Rise and Fall of New Jersey’s Once-Vibrant Nightclub Scene: What Happened?

    The Emmys are back: Viewership soars to highest numbers in 4 years – yahoo.com

    The Emmys Return with a Bang: Viewership Hits a 4-Year High

    From Spinal Tap II to Ed Sheeran : your complete entertainment guide to the week ahead – The Guardian

  • General
  • Health
  • News

    Cracking the Code: Why China’s Economic Challenges Aren’t Shaking Markets, Unlike America’s” – Bloomberg

    Trump’s Narrow Window to Spread the Truth About Harris

    Trump’s Narrow Window to Spread the Truth About Harris

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Trending Tags

    • Trump Inauguration
    • United Stated
    • White House
    • Market Stories
    • Election Results
  • Science
  • Sports
  • Technology
    Bucking the Odds: Why Technology Companies Should Embrace Software Patents Today – Crowell & Moring LLP

    Bucking the Odds: Why Technology Companies Should Embrace Software Patents Today – Crowell & Moring LLP

    City IT presented Best of North Carolina Technology Award – RaleighNC.gov

    City IT Honored with Best of North Carolina Technology Award

    LELO Releases 2025 Futurist Report: Intergenerational Views on Relationships, Sex, and Technology – PR Newswire

    Exploring the Future: How Different Generations View Relationships, Sex, and Technology in 2025

    Will New Big Technology Engagements Reshape Innodata’s Growth Path? – Yahoo Finance

    Could New Major Tech Partnerships Propel Innodata to Unprecedented Growth?

    Unlocking AI Success: How People, Process, and Technology Form the Ultimate Triangle

    Billion-dollar coffins? New technology could make oceans transparent and Aukus submarines vulnerable – The Guardian

    Billion-Dollar Coffins? How New Technology Could Make Oceans Transparent and Expose Submarines

    Trending Tags

    • Nintendo Switch
    • CES 2017
    • Playstation 4 Pro
    • Mark Zuckerberg
No Result
View All Result
Earth-News
No Result
View All Result
Home Technology

Infostealer malware logs used to identify child abuse website members

July 4, 2024
in Technology
Infostealer malware logs used to identify child abuse website members
Share on FacebookShare on Twitter

Hand sifting through data

Thousands of pedophiles who download and share child sexual abuse material (CSAM) were identified through information-stealing malware logs leaked on the dark web, highlighting a new dimension of using stolen credentials in law enforcement investigations.

The novel use of the dataset was conducted by Recorded Future’s Insikt Group, who shared a report explaining how they identified 3,324 unique accounts that accessed illegal portals known for distributing CSAM.

By leveraging other data stolen from the target, Insikt analysts could track those accounts to usernames on various platforms, derive their IP addresses, and even system information.

This information gathered by the Insikt Group has been shared with law enforcement to unmask the identities of these individuals and proceed to arrests.

Using stealer logs for good

A stealer log is a collection of data stolen from a particular individual by information-stealing malware, such as Redline, Raccoon, and Vidar, from infected systems.

When these types of malware are executed on a device, they collect credentials, browser history, browser cookies, autofill data, cryptocurrency wallet information, screenshots, and system information.

The information is then packaged into an archive called a “log,” which is then transmitted back to the threat actor’s servers.

Threat actors can then use these stolen credentials to breach further accounts, conduct corporate attacks, or sell them to other cybercriminals on the dark web, Telegram, and other platforms. Due to their size and number, these logs are rarely scrutinized and categorized but rather sold in bulk.

Previous analysis has shown that information-stealer logs can contain crucial business account data or credentials to accounts that can expose proprietary information.

As this type of malware is commonly distributed via pirated software, malvertising, and fake updates, they can siphon data from infected systems for extended periods without the victim realizing it.

This includes CSAM users who, without their knowledge, expose all of the credentials for their online banking, email, and other legitimate accounts, as well as the account credentials used for accessing CSAM sites that require registration.

Identifying CSAM consumers

Insikt analysts used infostealer logs captured between February 2021 and February 2024 to identify CSAM consumers by cross-referencing stolen credentials with twenty known CSAM domains.

They then removed duplicates to narrow the results to 3,324 unique username-password pairs.

Accounts linked to known CSAM sitesAccounts linked to known CSAM sites
Source: Recorded Future

As information-stealing malware steals all credentials saved in a browser, the researchers were able to link CSAM account holders to their legal online accounts, such as email, banking, online shopping, mobile carriers, and social media.

They then used open-source intelligence (OSINT) and digital artifacts to gather more revealing information about those users. These clues include:

Cryptocurrency wallet addresses and transaction histories.
Non-CSAM web accounts and browsing history.
Physical addresses, full names, phone numbers, and email addresses extracted from browser autofill data.
Associations with various online services, such as social media accounts, government websites, and job application portals.

Recorded Future’s report highlights three cases of identified individuals, summarized as follows:

“d****” – Cleveland, Ohio resident previously convicted for child exploitation and registered as a sex offender. Maintains accounts on at least four CSAM sites.
“docto” – Illinois resident who volunteers at children’s hospitals and has a record for retail theft. Maintains accounts on nine CSAM websites.
“Bertty” – Likely a Venezuelan student who maintains accounts on at least five CSAM sites. Cryptocurrency transaction history implicates the user with the potential purchase and distribution of CSAM content.

Docto's profile as reconstructed by infostealer log analysisDocto’s profile as reconstructed by infostealer log analysis
Source: Recorded Future

Insinkt’s analysis highlights the potential of infostealer data in aiding law enforcement to track child abuse tracking and prosecute individuals.

>>> Read full article>>>
Copyright for syndicated content belongs to the linked Source : BleepingComputer – https://www.bleepingcomputer.com/news/security/infostealer-malware-logs-used-to-identify-child-abuse-website-members/

Tags: Infostealermalwaretechnology
Previous Post

Leak: Basically every spec for Samsung’s Z Fold 6 and Z Flip 6

Next Post

Formula 1 governing body discloses data breach after email hacks

Trump Designates Antifa ‘Terror Organisation’ Days After Charlie Kirk Murder – NDTV

Trump Designates Antifa ‘Terror Organisation’ Days After Charlie Kirk Murder – NDTV

September 18, 2025
Study: UIS contributes nearly $1 billion to the Illinois economy – NPR Illinois

Study: UIS contributes nearly $1 billion to the Illinois economy – NPR Illinois

September 18, 2025
REO to return for UI homecoming – The News-Gazette

REO Gears Up to Ignite the Stage at UI Homecoming Celebration!

September 18, 2025
WATCH: Former CDC doctor says U.S. is on track to see uptick in preventable diseases under Kennedy – PBS

WATCH: Former CDC Doctor Warns of Rising Preventable Diseases in the U.S

September 18, 2025
Local politicians, judges, officials face increased threats, new data shows – WDSU

Local politicians, judges, officials face increased threats, new data shows – WDSU

September 18, 2025
Washington State Honors Hanford Team for Protecting Native Habitat – Department of Energy (.gov)

Washington State Celebrates Hanford Team’s Success in Protecting Native Habitat

September 17, 2025
Kent State University unveils poetry inspired by science despite federal funding cut – Ideastream

Kent State University Unveils Science-Inspired Poetry Amid Federal Funding Cuts

September 17, 2025
Fired CDC director warns of backslide in US vaccine science under RFK Jr – Al Jazeera

Fired CDC director warns of backslide in US vaccine science under RFK Jr – Al Jazeera

September 17, 2025
Melting Pot Brings Back Its Most ‘Luxurious’ Fondue for a Limited Time – yahoo.com

Melting Pot Brings Back Its Most ‘Luxurious’ Fondue for a Limited Time – yahoo.com

September 17, 2025
Bucking the Odds: Why Technology Companies Should Embrace Software Patents Today – Crowell & Moring LLP

Bucking the Odds: Why Technology Companies Should Embrace Software Patents Today – Crowell & Moring LLP

September 17, 2025

Categories

Archives

September 2025
MTWTFSS
1234567
891011121314
15161718192021
22232425262728
2930 
« Aug    
Earth-News.info

The Earth News is an independent English-language daily published Website from all around the World News

Browse by Category

  • Business (20,132)
  • Ecology (824)
  • Economy (844)
  • Entertainment (21,723)
  • General (17,097)
  • Health (9,889)
  • Lifestyle (858)
  • News (22,149)
  • People (848)
  • Politics (854)
  • Science (16,055)
  • Sports (21,344)
  • Technology (15,826)
  • World (828)

Recent News

Trump Designates Antifa ‘Terror Organisation’ Days After Charlie Kirk Murder – NDTV

Trump Designates Antifa ‘Terror Organisation’ Days After Charlie Kirk Murder – NDTV

September 18, 2025
Study: UIS contributes nearly $1 billion to the Illinois economy – NPR Illinois

Study: UIS contributes nearly $1 billion to the Illinois economy – NPR Illinois

September 18, 2025
  • About
  • Advertise
  • Privacy & Policy
  • Contact

© 2023 earth-news.info

No Result
View All Result

© 2023 earth-news.info

No Result
View All Result

© 2023 earth-news.info

Go to mobile version