卡片召唤师
精华
|
战斗力 鹅
|
回帖 0
注册时间 2024-2-17
|
发表于 2026-2-28 16:48
来自手机
|
显示全部楼层
Fake trainer info-stealer (flingtrainer[.]io)
One of the samples pretends to be a Battlefield 6 game trainer, a type of utility that alters in-game parameters, often sought out by players looking for advantages like infinite ammo or invincibility. This malware, promoted through the site flingtrainer[.]io, uses the name “FLiNG,” which has been stolen from a legitimate trainer developer to increase credibility.
Despite its basic structure and lack of obfuscation, the executable aggressively targets browser-stored credentials, crypto-wallet data, and Discord session tokens. Affected browsers include Chrome, Edge, Firefox, Opera, Brave, and even lesser-known ones like WaveBrowser. The stolen data is exfiltrated over plaintext HTTP to IP address 198[.]251[.]84[.]9, making no attempt to encrypt or hide traffic, suggesting a wide-net, mass-harvesting approach.
https://cyberinsider.com/battlefield-6-players-targeted-by-malware-disguised-as-trainers/
搜到个25年的新闻,信息窃取的,浏览器保存的密码,加密钱包私钥啥的 |
|