Hacker News new | past | comments | ask | show | jobs | submit login

Usually stealer is run by the attacker after using some vulnerability on Windows, or packed with pirated software and run by the user.



The most common way is for users to just download and execute it from a website or in an archive over email. No vulnerability exploitation needed, the guys that actually use vulns install a rat in addition to stealers and sell access to the computer/network.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: