HYAS Documents Risepro Stealer Malware C2 Campaign 

David Brunsdon, Threat Intelligence Security Engineer with HYAS, has published “Risepro Malware Campaign On The Rise.”

Brunsdon says: “we saw a surge in activity related to the Risepro malware, particularly targeting IP address 147.45.47.93 – its C2 ‘mother ship.’ This signifies a concerning development in the cyber threat landscape, as Risepro, akin to StealC, is a notorious form of stealer malware designed to exfiltrate sensitive information from compromised systems.

The HYAS threat analysis provide an in-depth understanding of the Risepro malware campaign based on the provided information, focusing on the actor’s tactics, techniques, and procedures (TTPs).  It includes a risk assessment of data compromise, operational disruption and IP theft, and offers mitigation strategies.

Today’s HYAS Threat Intelligence Report also notes the top five ASNs identified in HYAS Insight this last week.

You can read the analysis here.

Leave a Reply

Discover more from The IT Nerd

Subscribe now to keep reading and get access to the full archive.

Continue reading