Enhance cybersecurity awareness and survivability for DoD, industry partners, and academia in the face of the ever-increasing threat of cyber attacks. Cybersecurity (CS) includes managing risks related to the use, processing, storage, and transmission of information and the systems and processes used for those purposes, including analog and physical form. CS includes information availability, identification and authentication, confidentiality, integrity, and non-repudiation as well as the economic considerations with respect to selection of CS techniques, CS processes, and industry trends.
Analyzing the Behavior of Vidar Information-Stealing Malware
- This topic has 0 replies, 1 voice, and was last updated 11 months, 1 week ago by .
Vidar is a family of malware that operates primarily as an information stealer and is often observed as a channel to enable ransomware deployment. The malware originally became active in late 2018.
What are its capabilities?
The malware is capable of exfiltrating a variety of data from an infected system including system information, browser data, and credentials.
The data collected from infected systems include Machine ID and GUID, operating system, computer name, current username, display resolution, keyboard language, hardware information, network information, and a list of installed software.
You must be logged in to reply to this topic.