A new version of the obfuscation tool, ScrubCrypt, is being used to target organizations with a malware called RedLine Stealer, says Human Security’s Satori Threat Intelligence Team. ScrubCrypt helps avoid detection by converting executable files into batch files and is available for sale in dark web marketplaces. The new version was found to be used for account takeover and fraud attacks. To mitigate such threats, businesses are advised to deploy cookie-stealing attack protections, flag leaked or stolen user credentials, enforce password changes, and confirm identity through two-factor authentication.
![](https://healsecurity.com/wp-content/uploads/2024/07/group-ibs-threat-intelligence-and-defence-centre-equip-undergraduates-with-sophisticated.jpg)
Group-IB’s Threat Intelligence and Defence Centre Equip Undergraduates with Sophisticated Cybersecurity Technologies to Boost Threat Analysis and Enhance Cyber Resilience for Campus Start-ups
Hey there from the heart of the San Francisco Bay Area! It’s an absolute pleasure to have you back again for our chat on some