On October 5, 2022, a newly unsealed federal grand jury indictment charged Ukrainian national Mark Sokolovsky, 26, for his alleged role in a global cyber operation known as Raccoon Infostealer. For years this malware has infected millions of computers, compromising at least 50 million credentials across the globe.

Racoon Infostealer Operator Awaits Extradition

As of late October, Sokolovsky was being held in the Netherlands awaiting an extradition request by the United States. As per the DOJ, Sokolovsky is accused of operating, along with others, the Raccoon Infostealer Malware-as-a-Service. Actors signed up to use Raccoon Infostealer for approximately $200 per month, paid for by cryptocurrency.

The malicious service used methods such as email phishing to install malware that steals personal data. The FBI stated that the malware exfiltrated log-in credentials, financial information and other personal records. Malicious actors could then use the stolen data to commit financial fraud, or sell it on cyber forums.

Massive Malware-as-a-Service Scam

Raccoon Infostealer has been one of the most prolific information stealers to date. The stealer’s popularity is due to its wide range of capabilities, customizability and ease of use. Active since April 2019, the cyber gang behind Raccoon halted service in March. Court documents show that Sokolovsky’s arrest and the takedown of the malware’s infrastructure led to the temporary shutdown.

Now, a second version of Raccoon Stealer written in C/C++ has surfaced on underground forums as of June 2022. The threat group posted a message on Telegram saying, “It is so fast and simple that … it will not be difficult for a child to learn how to process logs”.

According to the FBI, the malware facilitated the theft of approximately 50 million unique credentials and forms of identification. The data includes email addresses, bank accounts, cryptocurrency addresses and credit card numbers.

The FBI has even put up a web page where users can check if their email has been compromised by Raccoon Infostealer.

Thwarting Malware-as-a-Service

Services like Raccoon Infostealer spread the use of malignant attack tools. This amplifies the threat as even those without technical skills can launch attacks.

Although malware continues to plague organizations worldwide, protection is possible. Some effective malware mitigation methods include:

  • Training: Users are the first line of defense in an organization’s malware protection strategy. Formal training enables users to further minimize the risk of malware and other cybersecurity threats.
  • SOAR (security orchestration, automation and response): SOAR integrates and coordinates disparate security tools, enabling semi- or fully-automated “playbooks” for responding to potential or actual threats.
  • EDR (endpoint detection and response): EDR collects data continuously from all network endpoints, such as computers, servers, mobile devices and IoT devices. EDR correlates and analyzes the data to detect known threats or suspicious behaviors.
  • XDR (extended detection and response): XDR integrates security tools across an organization’s entire hybrid IT infrastructure — including endpoints, networks, email, applications, cloud workloads and more. XDR interoperates and coordinates cyber threat prevention, detection and response.

Although one of its leaders was indicted, Raccoon Infostealer continues to operate. While law enforcement efforts continue, companies must continue to defend themselves.

If you have questions and want a deeper discussion about the malware and prevention techniques, you can schedule a briefing here. Get the latest updates as more information develops on the IBM Security X-Force Exchange and the IBM PSIRT blog.

If you are experiencing cybersecurity issues or an incident, contact X-Force to help: US hotline 1-888-241-9812 | Global hotline (+001) 312-212-8034.

More cybersecurity threat resources are available here.

More from News

The White House on Quantum Encryption and IoT Labels

A recent White House Fact Sheet outlined the current and future U.S. cybersecurity priorities. While most of the topics covered were in line with expectations, others drew more attention. The emphasis on critical infrastructure protection is clearly a top national priority. However, the plan is to create a labeling system for IoT devices, identifying the ones with the highest cybersecurity standards. Few expected that news. The topic of quantum-resistant encryption reveals that such concerns may become a reality sooner than…

Malware-as-a-Service Flaunts Its Tally of Users and Victims

As time passes, the security landscape keeps getting stranger and scarier. How long did the “not if, but when” mentality towards cyberattacks last — a few years, maybe? Now, security pros think in terms of how often will their organization be attacked and at what cost. Or they consider how the difference between legitimate Software-as-a-Service (SaaS) brands and Malware-as-a-Service (MaaS) gangs keeps getting blurrier. MaaS operators provide web-based services, slick UX, tiered subscriptions, newsletters and Telegram channels that keep users…

New Survey Shows Burnout May Lead to Attrition

For many organizations and the cybersecurity industry as a whole, improving retention and reducing the skills gap is a top priority. Mimecast’s The State of Ransomware Readiness 2022: Reducing the Personal and Business Cost points to another growing concern — burnout that leads to attrition. Without skilled employees, organizations cannot protect their data and infrastructure from increasing cybersecurity attacks. According to Mimecast’s report, 77% of cybersecurity leaders say the number of cyberattacks against their company has increased or stayed the…

Alleged FBI Database Breach Exposes Agents and InfraGard

Recently the feds suffered a big hack, not once, but twice. First, the FBI-run InfraGard program suffered a breach. InfraGard aims to strengthen partnerships with the private sector to share information about cyber and physical threats. That organization experienced a major breach in early December, according to a KrebsOnSecurity report. Allegedly, the InfraGard database — containing contact information of over 80,000 members — appeared up for sale on a cyber crime forum. Also, the hackers have reportedly been communicating with…