New York Tech Media
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
New York Tech Media
No Result
View All Result
Home Cybersecurity

VirusTotal hacking – Hackers can access trove of stolen credentials on VirusTotal

New York Tech Editorial Team by New York Tech Editorial Team
January 19, 2022
in Cybersecurity
0
VirusTotal hacking – Hackers can access trove of stolen credentials on VirusTotal
Share on FacebookShare on Twitter

Dubbed VirusTotal Hacking; the attack allowed researchers to access 1,000,000 login credentials exfiltrated by unencrypted crypto wallets and different types of malware.

Security researchers at SafeBreach have discovered a way to collect huge amounts of stolen user credentials only by executing searches on VirusTotal. For your information, VirusTotal is an online platform used to examine suspicious URLs and documents. 

The problem with this new finding is that VirusTotal can be exploited to steal large amounts of credentials without hacking an organization’s network or buying the credentials.

Research Findings

According to SafeBreach researchers, they could collect over 1,000,000 credentials exfiltrated by unencrypted cryptocurrency wallets and different types of malware. The researchers managed to conduct the hack by executing simple searches using a $679 VirusTotal license and tools.

It all started with the curiosity to identify the kind of data a cybercriminal or hacker could collect if they have a VirusTotal license. A user with this license can perform a wide range of tasks such as searching for the service’s dataset with several queries to reveal the file type, submitted data, file name, country, file content, etc.

How Was The Hacking Planned?

SafeBreach researchers decided to hack VirusTotal to determine if a cybercriminal can exploit this service to steal credentials. Their research was based on the Google Hacking method. 

Researchers were able to access sensitive data belonging to 1,300 government sites from 48 countries (Source: SafeBreach)

This method is used by criminals to scan for vulnerable websites, web shells, internet of things devices, and sensitive data leaks. Researchers revealed in their report that most information stealers collect credentials from various platforms like forums, browsers, and mail accounts and write them to a hard-coded filename, for instance, all_credentials.txt. 

This file is then exfiltrated to the attacker’s C2 server from the targeted device. SafeBreach’s team of researchers used VirusTotal tools and APIs like VirusTotal Graph, search, and Retrohunt to find files containing stolen data. SafeBreach’s director of security research, Tomer Bar, stated that this is a pretty straightforward technique to steal data from VirusTotal.

It is quite a straightforward technique, which doesn’t require a strong understanding of malware. All you need is to choose one of the most common info stealers and read about it online.

Tomer Bar – SafeBreach

Malware Used in the Research

According to SafeBreach’s report, researchers used known malware like Azorult, RedLine Stealer, Raccoon Stealer, and Hawkeye in their experiment. They also used popular forums like Snatch_Cloud, DrDark to uncover sensitive data that is readily available to criminals in VirusTotal.

Furthermore, researchers used VirusTotal Query to look for binaries identified by an antivirus engine. They got 800 results in return. Then they searched for files titled DomainDetects.txt. This is one of the file names that the RedLine malware can exfiltrate. They received hundreds of exfiltrated files in return.

Example of password file exfiltrated by RedLine malware (left) – One of the ZIP files, when extracted, contained plain text login credentials for Snapchat, Apple, Facebook, and other sensitive data (middle) – One of the RAR files when extracted contained data on 500 victims, including 22,715 passwords from several different websites (right) (Source: SafeBreach)

Thereupon, they used VirusTotal Graph to explore the dataset visually and found a RAR file containing exfiltrated data belonging to around 500 victims, including 22,715 passwords from different websites, larger files with more passwords, and government-related website URLs as well.

We proved that the “VirusTotal hacking” method works at scale. A criminal who uses this method can gather an almost unlimited number of credentials and other user-sensitive data with very little effort in a short period of time using an infection-free approach. We called it the perfect cybercrime, not just due to the fact that there is no risk and the effort is very low, but also due to the inability of victims to protect themselves from this type of activity.

Tomer Bar – SafeBreach

No action from Google

Bar also revealed that the company informed Google (since Google’s subsidiary company Chronicle Security owns VirusTotal) about their findings with recommendations that the sensitive data on the website should be immediately deleted. 

However, after a month, Google thanked researchers for the alert but did not delete any of the reported data/files. Therefore, at the time of writing, the reported data was still accessible to malicious elements.


ghostadmin

Take away:

  • VirusTotal hosts our data
  • Google will not delete that data
  • Cybercriminals can access that data

Credit: Source link

Previous Post

Crypto.com CEO confirms hundreds of accounts were hacked, hedges on other details

Next Post

Cosmos-Based Privacy Startup Nym Onboards Network Validators

New York Tech Editorial Team

New York Tech Editorial Team

New York Tech Media is a leading news publication that aims to provide the latest tech news, fintech, AI & robotics, cybersecurity, startups & leaders, venture capital, and much more!

Next Post
Cosmos-Based Privacy Startup Nym Onboards Network Validators

Cosmos-Based Privacy Startup Nym Onboards Network Validators

  • Trending
  • Comments
  • Latest
Meet the Top 10 K-Pop Artists Taking Over 2024

Meet the Top 10 K-Pop Artists Taking Over 2024

March 17, 2024
Panther for AWS allows security teams to monitor their AWS infrastructure in real-time

Many businesses lack a formal ransomware plan

March 29, 2022
Zach Mulcahey, 25 | Cover Story | Style Weekly

Zach Mulcahey, 25 | Cover Story | Style Weekly

March 29, 2022
How To Pitch The Investor: Ronen Menipaz, Founder of M51

How To Pitch The Investor: Ronen Menipaz, Founder of M51

March 29, 2022
Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

March 29, 2022
UK VC fund performance up on last year

VC-backed Aerium develops antibody treatment for Covid-19

March 29, 2022
Startups On Demand: renovai is the Netflix of Online Shopping

Startups On Demand: renovai is the Netflix of Online Shopping

2
Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

1
Menashe Shani Accessibility High Tech on the low

Revolutionizing Accessibility: The Story of Purple Lens

1

Netgear announces a $1,500 Wi-Fi 6E mesh router

0
These apps let you customize Windows 11 to bring the taskbar back to life

These apps let you customize Windows 11 to bring the taskbar back to life

0
This bipedal robot uses propeller arms to slackline and skateboard

This bipedal robot uses propeller arms to slackline and skateboard

0
Coffee Nova’s $COFFEE Token

Coffee Nova’s $COFFEE Token

May 29, 2025
Money TLV website

BridgerPay to Spotlight Cross-Border Payments Innovation at Money TLV 2025

May 27, 2025
The Future of Software Development: Why Low-Code Is Here to Stay

Building Brand Loyalty Starts With Your Team

May 23, 2025
Tork Media Expands Digital Reach with Acquisition of NewsBlaze and Buzzworthy

Creative Swag Ideas for Hackathons & Launch Parties

May 23, 2025
Tork Media Expands Digital Reach with Acquisition of NewsBlaze and Buzzworthy

Strengthening Cloud Security With Automation

May 22, 2025
How Local IT Services in Anderson Can Boost Your Business Efficiency

Why VPNs Are a Must for Entrepreneurs in Asia

May 22, 2025

Recommended

Coffee Nova’s $COFFEE Token

Coffee Nova’s $COFFEE Token

May 29, 2025
Money TLV website

BridgerPay to Spotlight Cross-Border Payments Innovation at Money TLV 2025

May 27, 2025
The Future of Software Development: Why Low-Code Is Here to Stay

Building Brand Loyalty Starts With Your Team

May 23, 2025
Tork Media Expands Digital Reach with Acquisition of NewsBlaze and Buzzworthy

Creative Swag Ideas for Hackathons & Launch Parties

May 23, 2025

Categories

  • AI & Robotics
  • Benzinga
  • Cybersecurity
  • FinTech
  • New York Tech
  • News
  • Startups & Leaders
  • Venture Capital

Tags

3D bio-printing acoustic AI Allseated B2B marketing Business carbon footprint climate change coding Collaborations Companies To Watch consumer tech crypto cryptocurrency deforestation drones earphones Entrepreneur Fetcherr Finance Fintech food security Investing Investors investorsummit israelitech Leaders LinkedIn Leaders Metaverse news OurCrowd PR Real Estate reforestation software start- up Startups Startups On Demand startuptech Tech Tech leaders technology UAVs Unlimited Robotics VC
  • Contact Us
  • Privacy Policy
  • Terms and conditions

© 2024 All Rights Reserved - New York Tech Media

No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital

© 2024 All Rights Reserved - New York Tech Media