According to Microsoft, Stilachirat was initially discovered in November last year. Since then, the experts assessed their capabilities, in the investigation it revealed A variety of methods for stealing information, including accreditation data stored in the browser and digital portfolio information, as well as data from the transfer area and the affected system.
Although he has not yet been able to set the creation of harmful programs for a specific attacker or location, Microsoft is currently progressing. Stilachirat does not have a huge distribution capacity. On the other hand, due to The capabilities of harmful programs and rapid changes in the ecosystem of harmful programs, the situation can change.
Microsoft explains that malicious programs such as Stilachihat can be installed through various vectors. For example, It is common for this type of Trojan to be “hidden” in applications that may look legitimate at first glance And their updates. The same applies to Malignant web sites and hunting, as well as emails with suspicious links.
In addition to using advanced tactics to avoid detection, at Styilathat Mechanisms to ensure that they cannot be easily removed from the affected equipment. Menu programs are also able to Collect a wide range of system informationIncluding around the operating system, BIOS number and room. One of the infected equipment is also created Microsoft.
S. Stilachirat aims to a series of additions to the coded currency governor on Google Chrome He is able to read Data has been copied to the transfer area to steal sensitive information such as passwords and cryptocurrencies. Microsoft researchers also notes that harmful programs can run multiple orders, received by Strikes server to treat the affected system.