Raccoon Stealer Returns With New Version That Targets Users’ Passwords

June 29, 2022

The Raccoon Stealer malware returns with a new version that attackers can access on cybercrime forums. According to security analysts from Sekoia, Raccoon 2.0 was built from scratch with C/C++. It has a new back-end, front-end, and code to steal credentials and other data.

The malware is only available to a limited number of hackers, mainly former users, at a cost of $275/month or $125/week.

The researchers found that the new Racoon Stealer can work on 32 and 64-bit systems without any dependencies and fetches only eight legitimate DLLs from its C2 servers.

The C2 server provides the malware with its configurations, including targeted apps, URLs hosting the DLLs, and tokens for data exfiltration. The C2 server also receives machine fingerprint data and then waits for individual POST requests containing stolen information.

Data stolen by Raccoon Stealer 2.0 include: basic system fingerprint information; browser passwords, cookies, autofill data, and stored credit cards; wallets for cryptocurrencies and browser extensions; individual files on all hard drives; screenshot capture; and installed application list.

“We expect a resurgence of Raccoon Stealer v2, as developers implemented a version tailored to the needs of cybercriminals (efficiency, performance, stealing capabilities, etc.) and scaled their backbone servers to handle large loads,” Sekoia comments in the report.

The sources for this piece include an article in BleepingComputer.

Top Stories

Related Articles

April 2, 2026 Researchers from California Institute of Technology and start-up Oratomic have demonstrated a new error-correction approach that could more...

April 2, 2026 AMD has agreed to acquire Intel in an all-stock transaction that would combine the two long-time x86 more...

April 1, 2026 Anthropic has inadvertently exposed the full source code of its Claude Code tool for the second time more...

April 1, 2026 Cisco suffered a cyberattack after attackers used stolen credentials from a compromised developer tool to access its more...

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn