theft

AppWizard
April 30, 2026
A new infostealer malware called LofyStealer is targeting the gaming community, particularly Minecraft players, by disguising itself as a cheat tool named “Slinky.” It employs a two-stage attack to extract sensitive information from eight major web browsers, including Chrome and Firefox, while evading detection by security software. The malware siphons off cookies, saved passwords, payment card information, and session tokens. Researchers at Zenox.ai identified LofyStealer, linking it to the Brazilian cybercrime group LofyGang, which has been active since October 2022. The malware uses social engineering tactics to appear legitimate and operates as a Malware-as-a-Service platform, offering both Free and Premium tiers to buyers. Its technical sophistication is evident in its method of in-memory browser injection, which allows it to bypass security defenses. The stolen data is compressed and sent to a command-and-control server. Users are advised to avoid downloading unofficial game mods and enable multi-factor authentication to reduce the risk of credential theft. Security teams should monitor for specific behavioral indicators related to the malware's operations.
AppWizard
April 30, 2026
Grand Theft Auto VI is expected to have its third trailer released soon, likely coinciding with the start of pre-orders, as the game is set to launch in November. Take-Two's CEO has indicated that marketing efforts will ramp up ahead of the company's investor call on May 21. Rockstar Games has resumed social media engagement with fans, hinting at upcoming announcements. Meanwhile, a free open-world RPG called Neverness to Everness, referred to as ‘Anime GTA VI’ by fans, is available for players. This game allows players to explore a city, engage in criminal activities, and features a consequence system for getting caught. It is available on PC and PS5, but not on Steam for PC users. The PlayStation Store shows that 75% of players rated it five out of five.
AppWizard
April 28, 2026
A sophisticated scam targeting Verizon customers has emerged, exploiting the My Verizon app to send fraudulent push notifications. A Reddit user, ApprehensivePace2969, experienced this scam when they received a call from someone impersonating a Verizon representative, claiming they qualified for a 65% discount and a free iPad. The legitimacy of the offer was reinforced by a push notification from the app. The victim received a 256GB iPad Pro, valued at ,500, and was charged a shipping fee, which was promised to be refunded upon activation. However, they later received calls from another supposed Verizon representative, instructing them to return the iPad or face a full charge. Red flags included a return shipping label not from Verizon's official center and an unrelated New York address. The victim took the iPad to a real Verizon store, contacted the fraud department, and successfully returned the device, avoiding financial loss.
Tech Optimizer
April 27, 2026
Mysterium VPN offers a decentralized infrastructure with over 7,500 residential IPs across 100 countries, ensuring user privacy without requiring contributions of personal IPs. It features DNS and IP leak protection, a kill switch, ChaCha20 encryption, and a no-logs policy, complying with GDPR. Mysterium supports up to 15 devices simultaneously and is priced at .59 per month with a 7-day money-back guarantee. Bitdefender Total Security provides comprehensive antivirus protection, including malware detection, ransomware protection, firewall management, and device optimization tools, along with webcam protection and anti-phishing features. Kaspersky Premium delivers real-time antivirus protection, identity theft monitoring, secure payment tools, and parental controls, maintaining high threat detection capabilities. Proton VPN, based in Switzerland, emphasizes privacy and transparency, offering a solid free tier and premium features like Secure Core routing, although its speeds may vary. Malwarebytes Premium focuses on detecting newer or less common threats, evolving from a malware removal tool to a comprehensive security platform. Avast One integrates antivirus protection, VPN services, and performance optimization tools, providing identity monitoring and breach alerts, while working to enhance transparency after past scrutiny. 1Password specializes in secure password storage, generation, and autofill capabilities, along with features to alert users to compromised credentials and secure document storage.
AppWizard
April 22, 2026
Rockstar Games has invested over a billion dollars into the development of Grand Theft Auto 6. Alternatives to this game include Sleeping Dogs, which offers an open-world crime experience. Capcom's Resident Evil Requiem celebrates three decades of survival horror, while Cozy Pal Games provides a budget-friendly horror adventure. Pokémon Pokopia has gained recent success, with alternatives like Before the Green Moon offering a nostalgic farming sim experience. Forza Horizon 6 promises stunning visuals, and Wreckreation serves as a budget-friendly racing alternative. Death Stranding 2 is noted for its innovative gameplay, with Clone Escape providing a unique survival experience.
Tech Optimizer
April 22, 2026
A newly identified remote access trojan, STX RAT, emerged in 2026, integrating hidden remote desktop access with credential theft features. The name "STX" comes from the Start of Text magic byte x02, which it appends to communications with its command-and-control (C2) server. Initial sightings were reported in late February 2026, when it was delivered via a browser-downloaded VBScript file to a financial organization. By early March, Malwarebytes noted a campaign distributing STX RAT through compromised FileZilla installers. Researchers from eSentire’s Threat Response Unit analyzed the malware, which includes extensive anti-analysis measures and employs techniques like AMSI-ghosting. Once operational, STX RAT connects to a C2 server at 95.216.51.236, transmitting system information securely. It targets saved credentials from applications like FileZilla and includes a Hidden Virtual Network Computing (HVNC) module, allowing attackers to control a victim's machine without detection. Security teams are advised to block the C2 IP and implement detection rules to mitigate the threat.
Search