We review vendors based on rigorous testing and research but also take into account your feedback and our affiliate commission with providers. Some providers are owned by our parent company.
Learn more
vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.
Advertising Disclosure

vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

Meduza Stealer Targets Password Managers and Crypto Wallets

Meduza Stealer Targets Password Managers and Crypto Wallets
Zane Kennedy Published on 6th July 2023 Cybersecurity Researcher

The Uptycs Threat Research team has recently uncovered a formidable malware called Meduza Stealer, which poses a significant threat to Windows users and organizations worldwide.

In a recently published report, Uptycs says, "The Meduza Stealer has a singular objective: comprehensive data theft. It pilfers users' browsing activities, extracting a wide array of browser-related data. From critical login credentials to the valuable record of browsing history and meticulously curated bookmarks, no digital artifact is safe. Even crypto wallet extensions, password managers, and 2FA extensions are vulnerable.”

According to the report, Meduza Stealer has successfully collected data from a significant number of sources. It has targeted 19 password manager apps, 76 crypto wallets, 95 web browsers, as well as platforms like Discord and Steam. In addition, the malware has been able to harvest miner-related Windows Registry entries and compile a list of installed games.

To combat this emerging threat, Uptycs has taken action by incorporating a YARA rule into their products, enabling thorough memory scanning for swift detection and effective mitigation of the Meduza Stealer.

The Meduza Stealer is distinctive due to its operational design, avoiding obfuscation techniques, and utilizing a connection-based approach. This makes it challenging to detect and trace, enhancing its stealthy nature as a cybersecurity threat.

Marketing and distribution tactics play a crucial role in Meduza Stealer's growth. The malware administrator has employed sophisticated strategies to promote this malicious offer. By conducting static and dynamic scans using reputable antivirus software, they have demonstrated its ability to evade detection.

Concerningly, the malware offers a worrisome pricing model and control to subscribers. They can access stolen data and download or delete it directly from a user-friendly web panel.

The widespread marketing and distribution of Meduza Stealer across cybercrime forums and Telegram channels have raised concerns among cybersecurity professionals. Despite efforts to combat the threat, many antivirus software solutions have struggled to effectively detect the malware, making it even more challenging to address this issue.

To protect against Meduza Stealer and similar malware attacks, it is recommended to regularly update operating systems, browsers, and applications and exercise caution when downloading files or opening email attachments. It is also advised to use strong and unique passwords, enable two-factor authentication, install browser extensions only from trusted sources, and closely monitor financial accounts.

About the Author

Zane is a Cybersecurity Researcher and Writer at vpnMentor. His extensive experience in the tech and cybersecurity industries provides readers with accurate and trustworthy news stories and articles. He aims to help individuals protect themselves through informative content and awareness of cybersecurity's crucial role in today's digital landscape.