Malware, Threat Intelligence, Application security

Google Docs tapped by ACRStealer malware for C2

Google Docs icon seen close-up on a smartphone screen.

Information-stealing malware ACRStealer has followed the lead of the LummaC2 infostealer in leveraging legitimate platforms to facilitate its distribution, having added Google Docs as a means for covert command-and-control communications, reports Cybernews.

Attacks involved the retrieval and decoding of the legitimate C2 domain in base64, enabling ACRStealer to exfiltrate browser data, FTP credentials, text files, emails, chat logs, remote access program information, password manager details, VPN data, browser extension information, and database details, according to findings from AhnLab Security Intelligence Center researchers. Other services used by ACRStealer for intermediary C2 include Steam and telegra.ph. Such a development comes after a Hudson Rock report detailing infostealer attacks against the U.S. military and defense sector, impacting not only more than 500 employees from major defense and aerospace contractors Honeywell, Boeing, Lockheed Martin, and Leidos, but also hundreds other Army and Navy computers. Infostealers were also noted by Palo Alto Networks Unit 42 to be the leading threat faced by macOS devices.

An In-Depth Guide to Application Security

Get essential knowledge and practical strategies to fortify your applications.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds