Raccoon and Vidar spread via cracked software links

January 17, 2023

Since early 2020, more than 250 domains have been used in a widespread impersonation campaign aimed at disseminating the information-stealing malware Vidar and Raccoon.

Both pieces of malware are capable of stealing a wide range of personal information from compromised machines, as well as credentials from web browsers and data from various cryptocurrency wallets.

The infection chain “uses about a hundred of fake cracked software catalogue websites that redirect to several links before downloading the payload hosted on file share platforms, such as GitHub,” cybersecurity firm SEKOIA said in an analysis.

The attackers take advantage of users looking for cracked versions of software and games on search engines by displaying malicious websites on the first page. To trick victims into downloading and executing the malicious payloads, it employs a technique known as search engine optimization (SEO) poisoning.

The tainted result includes a download link to the promised software, which, when clicked, initiates a five-stage URL redirection pattern that takes the user to a web page showing a shortened link pointing to a password-protected RAR archive file hosted on GitHub, along with its password. If the victim uncompresses the RAR archive and runs the purported setup executable, either of the two malware families, Raccoon or Vidar, is installed on the system.

The sources for this piece include an article in TheHackerNews.

Top Stories

Related Articles

February 15, 2026 Ghost tapping scams are emerging as a new threat as tap-to-pay technology becomes more widespread. Unlike traditional more...

February 13, 2026 Cybersecurity researchers have uncovered a malicious Google Chrome extension designed to steal sensitive data from Meta Business more...

February 5, 2026 A security researcher at Koi named Oren Yomtov has uncovered a widespread malware operation embedded inside an more...

February 4, 2026 More than three million Fortinet devices have been exposed to a critical authentication-bypass vulnerability that is being more...

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn